May 17 00:33:48.004197 kernel: Linux version 5.15.182-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri May 16 23:09:52 -00 2025 May 17 00:33:48.004226 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:33:48.004242 kernel: BIOS-provided physical RAM map: May 17 00:33:48.004251 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable May 17 00:33:48.004260 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000786cdfff] usable May 17 00:33:48.004269 kernel: BIOS-e820: [mem 0x00000000786ce000-0x000000007894dfff] reserved May 17 00:33:48.004281 kernel: BIOS-e820: [mem 0x000000007894e000-0x000000007895dfff] ACPI data May 17 00:33:48.004291 kernel: BIOS-e820: [mem 0x000000007895e000-0x00000000789ddfff] ACPI NVS May 17 00:33:48.004302 kernel: BIOS-e820: [mem 0x00000000789de000-0x000000007c97bfff] usable May 17 00:33:48.004312 kernel: BIOS-e820: [mem 0x000000007c97c000-0x000000007c9fffff] reserved May 17 00:33:48.004322 kernel: NX (Execute Disable) protection: active May 17 00:33:48.004331 kernel: e820: update [mem 0x76813018-0x7681be57] usable ==> usable May 17 00:33:48.004340 kernel: e820: update [mem 0x76813018-0x7681be57] usable ==> usable May 17 00:33:48.004350 kernel: extended physical RAM map: May 17 00:33:48.004366 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable May 17 00:33:48.004376 kernel: reserve setup_data: [mem 0x0000000000100000-0x0000000076813017] usable May 17 00:33:48.004387 kernel: reserve setup_data: [mem 0x0000000076813018-0x000000007681be57] usable May 17 00:33:48.004397 kernel: reserve setup_data: [mem 0x000000007681be58-0x00000000786cdfff] usable May 17 00:33:48.004408 kernel: reserve setup_data: [mem 0x00000000786ce000-0x000000007894dfff] reserved May 17 00:33:48.004419 kernel: reserve setup_data: [mem 0x000000007894e000-0x000000007895dfff] ACPI data May 17 00:33:48.004429 kernel: reserve setup_data: [mem 0x000000007895e000-0x00000000789ddfff] ACPI NVS May 17 00:33:48.004439 kernel: reserve setup_data: [mem 0x00000000789de000-0x000000007c97bfff] usable May 17 00:33:48.004450 kernel: reserve setup_data: [mem 0x000000007c97c000-0x000000007c9fffff] reserved May 17 00:33:48.004460 kernel: efi: EFI v2.70 by EDK II May 17 00:33:48.004472 kernel: efi: SMBIOS=0x7886a000 ACPI=0x7895d000 ACPI 2.0=0x7895d014 MEMATTR=0x77004a98 May 17 00:33:48.004484 kernel: SMBIOS 2.7 present. May 17 00:33:48.004494 kernel: DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017 May 17 00:33:48.004504 kernel: Hypervisor detected: KVM May 17 00:33:48.004514 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 17 00:33:48.004524 kernel: kvm-clock: cpu 0, msr 3919a001, primary cpu clock May 17 00:33:48.004534 kernel: kvm-clock: using sched offset of 4484606873 cycles May 17 00:33:48.004545 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 17 00:33:48.004556 kernel: tsc: Detected 2500.004 MHz processor May 17 00:33:48.004566 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 17 00:33:48.004576 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 17 00:33:48.004590 kernel: last_pfn = 0x7c97c max_arch_pfn = 0x400000000 May 17 00:33:48.004600 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 17 00:33:48.004611 kernel: Using GB pages for direct mapping May 17 00:33:48.004621 kernel: Secure boot disabled May 17 00:33:48.004633 kernel: ACPI: Early table checksum verification disabled May 17 00:33:48.004648 kernel: ACPI: RSDP 0x000000007895D014 000024 (v02 AMAZON) May 17 00:33:48.004659 kernel: ACPI: XSDT 0x000000007895C0E8 00006C (v01 AMAZON AMZNFACP 00000001 01000013) May 17 00:33:48.004684 kernel: ACPI: FACP 0x0000000078955000 000114 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001) May 17 00:33:48.004696 kernel: ACPI: DSDT 0x0000000078956000 00115A (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001) May 17 00:33:48.004707 kernel: ACPI: FACS 0x00000000789D0000 000040 May 17 00:33:48.004719 kernel: ACPI: WAET 0x000000007895B000 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001) May 17 00:33:48.004731 kernel: ACPI: SLIT 0x000000007895A000 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) May 17 00:33:48.004743 kernel: ACPI: APIC 0x0000000078959000 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001) May 17 00:33:48.004754 kernel: ACPI: SRAT 0x0000000078958000 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001) May 17 00:33:48.004768 kernel: ACPI: HPET 0x0000000078954000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001) May 17 00:33:48.004780 kernel: ACPI: SSDT 0x0000000078953000 000759 (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) May 17 00:33:48.004791 kernel: ACPI: SSDT 0x0000000078952000 00007F (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) May 17 00:33:48.004802 kernel: ACPI: BGRT 0x0000000078951000 000038 (v01 AMAZON AMAZON 00000002 01000013) May 17 00:33:48.004814 kernel: ACPI: Reserving FACP table memory at [mem 0x78955000-0x78955113] May 17 00:33:48.004825 kernel: ACPI: Reserving DSDT table memory at [mem 0x78956000-0x78957159] May 17 00:33:48.004837 kernel: ACPI: Reserving FACS table memory at [mem 0x789d0000-0x789d003f] May 17 00:33:48.004848 kernel: ACPI: Reserving WAET table memory at [mem 0x7895b000-0x7895b027] May 17 00:33:48.004860 kernel: ACPI: Reserving SLIT table memory at [mem 0x7895a000-0x7895a06b] May 17 00:33:48.004874 kernel: ACPI: Reserving APIC table memory at [mem 0x78959000-0x78959075] May 17 00:33:48.004885 kernel: ACPI: Reserving SRAT table memory at [mem 0x78958000-0x7895809f] May 17 00:33:48.004896 kernel: ACPI: Reserving HPET table memory at [mem 0x78954000-0x78954037] May 17 00:33:48.004908 kernel: ACPI: Reserving SSDT table memory at [mem 0x78953000-0x78953758] May 17 00:33:48.004919 kernel: ACPI: Reserving SSDT table memory at [mem 0x78952000-0x7895207e] May 17 00:33:48.004931 kernel: ACPI: Reserving BGRT table memory at [mem 0x78951000-0x78951037] May 17 00:33:48.004942 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 May 17 00:33:48.004954 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 May 17 00:33:48.004965 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff] May 17 00:33:48.004979 kernel: NUMA: Initialized distance table, cnt=1 May 17 00:33:48.004990 kernel: NODE_DATA(0) allocated [mem 0x7a8ef000-0x7a8f4fff] May 17 00:33:48.005002 kernel: Zone ranges: May 17 00:33:48.005013 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 17 00:33:48.005025 kernel: DMA32 [mem 0x0000000001000000-0x000000007c97bfff] May 17 00:33:48.005037 kernel: Normal empty May 17 00:33:48.005048 kernel: Movable zone start for each node May 17 00:33:48.005060 kernel: Early memory node ranges May 17 00:33:48.005071 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] May 17 00:33:48.005086 kernel: node 0: [mem 0x0000000000100000-0x00000000786cdfff] May 17 00:33:48.005098 kernel: node 0: [mem 0x00000000789de000-0x000000007c97bfff] May 17 00:33:48.005110 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007c97bfff] May 17 00:33:48.005121 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 17 00:33:48.005133 kernel: On node 0, zone DMA: 96 pages in unavailable ranges May 17 00:33:48.005145 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges May 17 00:33:48.009747 kernel: On node 0, zone DMA32: 13956 pages in unavailable ranges May 17 00:33:48.009763 kernel: ACPI: PM-Timer IO Port: 0xb008 May 17 00:33:48.009778 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 17 00:33:48.009799 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 May 17 00:33:48.009813 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 17 00:33:48.009827 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 17 00:33:48.009841 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 17 00:33:48.009855 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 17 00:33:48.009868 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 17 00:33:48.009880 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 17 00:33:48.009894 kernel: TSC deadline timer available May 17 00:33:48.009906 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs May 17 00:33:48.009923 kernel: [mem 0x7ca00000-0xffffffff] available for PCI devices May 17 00:33:48.009936 kernel: Booting paravirtualized kernel on KVM May 17 00:33:48.009950 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 17 00:33:48.009964 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 May 17 00:33:48.009978 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 May 17 00:33:48.009991 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 May 17 00:33:48.010005 kernel: pcpu-alloc: [0] 0 1 May 17 00:33:48.010019 kernel: kvm-guest: stealtime: cpu 0, msr 7a41c0c0 May 17 00:33:48.010033 kernel: kvm-guest: PV spinlocks enabled May 17 00:33:48.010049 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 17 00:33:48.010063 kernel: Built 1 zonelists, mobility grouping on. Total pages: 501318 May 17 00:33:48.010077 kernel: Policy zone: DMA32 May 17 00:33:48.010093 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:33:48.010107 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 17 00:33:48.010121 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 17 00:33:48.010135 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) May 17 00:33:48.010149 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 17 00:33:48.010165 kernel: Memory: 1876640K/2037804K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47472K init, 4108K bss, 160904K reserved, 0K cma-reserved) May 17 00:33:48.010179 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 May 17 00:33:48.010193 kernel: Kernel/User page tables isolation: enabled May 17 00:33:48.010206 kernel: ftrace: allocating 34585 entries in 136 pages May 17 00:33:48.010220 kernel: ftrace: allocated 136 pages with 2 groups May 17 00:33:48.010234 kernel: rcu: Hierarchical RCU implementation. May 17 00:33:48.010249 kernel: rcu: RCU event tracing is enabled. May 17 00:33:48.010275 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. May 17 00:33:48.010290 kernel: Rude variant of Tasks RCU enabled. May 17 00:33:48.010304 kernel: Tracing variant of Tasks RCU enabled. May 17 00:33:48.010319 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 17 00:33:48.010333 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 May 17 00:33:48.010349 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 May 17 00:33:48.010364 kernel: random: crng init done May 17 00:33:48.010377 kernel: Console: colour dummy device 80x25 May 17 00:33:48.010391 kernel: printk: console [tty0] enabled May 17 00:33:48.010405 kernel: printk: console [ttyS0] enabled May 17 00:33:48.010419 kernel: ACPI: Core revision 20210730 May 17 00:33:48.010432 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns May 17 00:33:48.010448 kernel: APIC: Switch to symmetric I/O mode setup May 17 00:33:48.010462 kernel: x2apic enabled May 17 00:33:48.010475 kernel: Switched APIC routing to physical x2apic. May 17 00:33:48.010488 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x24093d6e846, max_idle_ns: 440795249997 ns May 17 00:33:48.010503 kernel: Calibrating delay loop (skipped) preset value.. 5000.00 BogoMIPS (lpj=2500004) May 17 00:33:48.010516 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 May 17 00:33:48.010529 kernel: Last level dTLB entries: 4KB 64, 2MB 32, 4MB 32, 1GB 4 May 17 00:33:48.010545 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 17 00:33:48.010559 kernel: Spectre V2 : Mitigation: Retpolines May 17 00:33:48.010572 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 17 00:33:48.010586 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! May 17 00:33:48.010600 kernel: RETBleed: Vulnerable May 17 00:33:48.010613 kernel: Speculative Store Bypass: Vulnerable May 17 00:33:48.010626 kernel: MDS: Vulnerable: Clear CPU buffers attempted, no microcode May 17 00:33:48.010640 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode May 17 00:33:48.010653 kernel: GDS: Unknown: Dependent on hypervisor status May 17 00:33:48.010666 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 17 00:33:48.010696 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 17 00:33:48.010712 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 17 00:33:48.010726 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' May 17 00:33:48.010737 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' May 17 00:33:48.010748 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' May 17 00:33:48.010760 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' May 17 00:33:48.010770 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' May 17 00:33:48.010781 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' May 17 00:33:48.010791 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 17 00:33:48.010803 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 May 17 00:33:48.010815 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 May 17 00:33:48.010827 kernel: x86/fpu: xstate_offset[5]: 960, xstate_sizes[5]: 64 May 17 00:33:48.010843 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]: 512 May 17 00:33:48.010857 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024 May 17 00:33:48.010872 kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]: 8 May 17 00:33:48.010887 kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format. May 17 00:33:48.010901 kernel: Freeing SMP alternatives memory: 32K May 17 00:33:48.010916 kernel: pid_max: default: 32768 minimum: 301 May 17 00:33:48.010931 kernel: LSM: Security Framework initializing May 17 00:33:48.010945 kernel: SELinux: Initializing. May 17 00:33:48.010960 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 17 00:33:48.010974 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 17 00:33:48.010990 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x7) May 17 00:33:48.011007 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. May 17 00:33:48.011022 kernel: signal: max sigframe size: 3632 May 17 00:33:48.011037 kernel: rcu: Hierarchical SRCU implementation. May 17 00:33:48.011052 kernel: NMI watchdog: Perf NMI watchdog permanently disabled May 17 00:33:48.011067 kernel: smp: Bringing up secondary CPUs ... May 17 00:33:48.011082 kernel: x86: Booting SMP configuration: May 17 00:33:48.011096 kernel: .... node #0, CPUs: #1 May 17 00:33:48.011111 kernel: kvm-clock: cpu 1, msr 3919a041, secondary cpu clock May 17 00:33:48.011127 kernel: kvm-guest: stealtime: cpu 1, msr 7a51c0c0 May 17 00:33:48.011146 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. May 17 00:33:48.011162 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. May 17 00:33:48.011177 kernel: smp: Brought up 1 node, 2 CPUs May 17 00:33:48.011192 kernel: smpboot: Max logical packages: 1 May 17 00:33:48.011207 kernel: smpboot: Total of 2 processors activated (10000.01 BogoMIPS) May 17 00:33:48.011222 kernel: devtmpfs: initialized May 17 00:33:48.011237 kernel: x86/mm: Memory block size: 128MB May 17 00:33:48.011252 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x7895e000-0x789ddfff] (524288 bytes) May 17 00:33:48.011267 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 17 00:33:48.011284 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) May 17 00:33:48.011299 kernel: pinctrl core: initialized pinctrl subsystem May 17 00:33:48.011314 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 17 00:33:48.011329 kernel: audit: initializing netlink subsys (disabled) May 17 00:33:48.011344 kernel: audit: type=2000 audit(1747442028.417:1): state=initialized audit_enabled=0 res=1 May 17 00:33:48.011359 kernel: thermal_sys: Registered thermal governor 'step_wise' May 17 00:33:48.011374 kernel: thermal_sys: Registered thermal governor 'user_space' May 17 00:33:48.011389 kernel: cpuidle: using governor menu May 17 00:33:48.011404 kernel: ACPI: bus type PCI registered May 17 00:33:48.011421 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 17 00:33:48.011436 kernel: dca service started, version 1.12.1 May 17 00:33:48.011451 kernel: PCI: Using configuration type 1 for base access May 17 00:33:48.011466 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 17 00:33:48.011481 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 17 00:33:48.011496 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 17 00:33:48.011511 kernel: ACPI: Added _OSI(Module Device) May 17 00:33:48.011526 kernel: ACPI: Added _OSI(Processor Device) May 17 00:33:48.011541 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 17 00:33:48.011558 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 17 00:33:48.011573 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 17 00:33:48.011587 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 17 00:33:48.011602 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 17 00:33:48.011617 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded May 17 00:33:48.011656 kernel: ACPI: Interpreter enabled May 17 00:33:48.011671 kernel: ACPI: PM: (supports S0 S5) May 17 00:33:48.011700 kernel: ACPI: Using IOAPIC for interrupt routing May 17 00:33:48.011715 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 17 00:33:48.011733 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F May 17 00:33:48.011748 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 17 00:33:48.011964 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] May 17 00:33:48.012097 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. May 17 00:33:48.012115 kernel: acpiphp: Slot [3] registered May 17 00:33:48.012130 kernel: acpiphp: Slot [4] registered May 17 00:33:48.012145 kernel: acpiphp: Slot [5] registered May 17 00:33:48.012160 kernel: acpiphp: Slot [6] registered May 17 00:33:48.012178 kernel: acpiphp: Slot [7] registered May 17 00:33:48.012192 kernel: acpiphp: Slot [8] registered May 17 00:33:48.012207 kernel: acpiphp: Slot [9] registered May 17 00:33:48.012222 kernel: acpiphp: Slot [10] registered May 17 00:33:48.012237 kernel: acpiphp: Slot [11] registered May 17 00:33:48.012252 kernel: acpiphp: Slot [12] registered May 17 00:33:48.012266 kernel: acpiphp: Slot [13] registered May 17 00:33:48.012281 kernel: acpiphp: Slot [14] registered May 17 00:33:48.012296 kernel: acpiphp: Slot [15] registered May 17 00:33:48.012313 kernel: acpiphp: Slot [16] registered May 17 00:33:48.012327 kernel: acpiphp: Slot [17] registered May 17 00:33:48.012342 kernel: acpiphp: Slot [18] registered May 17 00:33:48.012357 kernel: acpiphp: Slot [19] registered May 17 00:33:48.012372 kernel: acpiphp: Slot [20] registered May 17 00:33:48.012386 kernel: acpiphp: Slot [21] registered May 17 00:33:48.012401 kernel: acpiphp: Slot [22] registered May 17 00:33:48.012416 kernel: acpiphp: Slot [23] registered May 17 00:33:48.012430 kernel: acpiphp: Slot [24] registered May 17 00:33:48.012448 kernel: acpiphp: Slot [25] registered May 17 00:33:48.012462 kernel: acpiphp: Slot [26] registered May 17 00:33:48.012477 kernel: acpiphp: Slot [27] registered May 17 00:33:48.012491 kernel: acpiphp: Slot [28] registered May 17 00:33:48.012506 kernel: acpiphp: Slot [29] registered May 17 00:33:48.012521 kernel: acpiphp: Slot [30] registered May 17 00:33:48.012536 kernel: acpiphp: Slot [31] registered May 17 00:33:48.012551 kernel: PCI host bridge to bus 0000:00 May 17 00:33:48.012703 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 17 00:33:48.012823 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 17 00:33:48.012932 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 17 00:33:48.013041 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] May 17 00:33:48.013149 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x2000ffffffff window] May 17 00:33:48.013257 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 17 00:33:48.013404 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 May 17 00:33:48.013537 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 May 17 00:33:48.013668 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x000000 May 17 00:33:48.013802 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI May 17 00:33:48.013920 kernel: pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff May 17 00:33:48.014034 kernel: pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff May 17 00:33:48.014152 kernel: pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff May 17 00:33:48.014265 kernel: pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff May 17 00:33:48.014384 kernel: pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff May 17 00:33:48.014496 kernel: pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff May 17 00:33:48.014618 kernel: pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000 May 17 00:33:48.019822 kernel: pci 0000:00:03.0: reg 0x10: [mem 0x80000000-0x803fffff pref] May 17 00:33:48.019992 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] May 17 00:33:48.020124 kernel: pci 0000:00:03.0: BAR 0: assigned to efifb May 17 00:33:48.020251 kernel: pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 17 00:33:48.020392 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 May 17 00:33:48.020517 kernel: pci 0000:00:04.0: reg 0x10: [mem 0x80404000-0x80407fff] May 17 00:33:48.020647 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 May 17 00:33:48.020815 kernel: pci 0000:00:05.0: reg 0x10: [mem 0x80400000-0x80403fff] May 17 00:33:48.020836 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 17 00:33:48.020850 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 17 00:33:48.020863 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 17 00:33:48.020883 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 17 00:33:48.020897 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 May 17 00:33:48.020912 kernel: iommu: Default domain type: Translated May 17 00:33:48.020927 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 17 00:33:48.021057 kernel: pci 0000:00:03.0: vgaarb: setting as boot VGA device May 17 00:33:48.021186 kernel: pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 17 00:33:48.021312 kernel: pci 0000:00:03.0: vgaarb: bridge control possible May 17 00:33:48.021332 kernel: vgaarb: loaded May 17 00:33:48.021347 kernel: pps_core: LinuxPPS API ver. 1 registered May 17 00:33:48.021366 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 17 00:33:48.021381 kernel: PTP clock support registered May 17 00:33:48.021396 kernel: Registered efivars operations May 17 00:33:48.021411 kernel: PCI: Using ACPI for IRQ routing May 17 00:33:48.021426 kernel: PCI: pci_cache_line_size set to 64 bytes May 17 00:33:48.021440 kernel: e820: reserve RAM buffer [mem 0x76813018-0x77ffffff] May 17 00:33:48.021455 kernel: e820: reserve RAM buffer [mem 0x786ce000-0x7bffffff] May 17 00:33:48.021470 kernel: e820: reserve RAM buffer [mem 0x7c97c000-0x7fffffff] May 17 00:33:48.021484 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 May 17 00:33:48.021502 kernel: hpet0: 8 comparators, 32-bit 62.500000 MHz counter May 17 00:33:48.021517 kernel: clocksource: Switched to clocksource kvm-clock May 17 00:33:48.021532 kernel: VFS: Disk quotas dquot_6.6.0 May 17 00:33:48.021547 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 17 00:33:48.021561 kernel: pnp: PnP ACPI init May 17 00:33:48.021576 kernel: pnp: PnP ACPI: found 5 devices May 17 00:33:48.021591 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 17 00:33:48.021606 kernel: NET: Registered PF_INET protocol family May 17 00:33:48.021621 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) May 17 00:33:48.021639 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) May 17 00:33:48.021654 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 17 00:33:48.021668 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) May 17 00:33:48.021757 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) May 17 00:33:48.021773 kernel: TCP: Hash tables configured (established 16384 bind 16384) May 17 00:33:48.021788 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) May 17 00:33:48.021803 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) May 17 00:33:48.021818 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 17 00:33:48.021833 kernel: NET: Registered PF_XDP protocol family May 17 00:33:48.021973 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 17 00:33:48.022090 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 17 00:33:48.022201 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 17 00:33:48.022311 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] May 17 00:33:48.022419 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x2000ffffffff window] May 17 00:33:48.022553 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers May 17 00:33:48.022779 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds May 17 00:33:48.022805 kernel: PCI: CLS 0 bytes, default 64 May 17 00:33:48.022821 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer May 17 00:33:48.022836 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x24093d6e846, max_idle_ns: 440795249997 ns May 17 00:33:48.022851 kernel: clocksource: Switched to clocksource tsc May 17 00:33:48.022866 kernel: Initialise system trusted keyrings May 17 00:33:48.022881 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 May 17 00:33:48.022896 kernel: Key type asymmetric registered May 17 00:33:48.022911 kernel: Asymmetric key parser 'x509' registered May 17 00:33:48.022925 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 17 00:33:48.022943 kernel: io scheduler mq-deadline registered May 17 00:33:48.022958 kernel: io scheduler kyber registered May 17 00:33:48.022972 kernel: io scheduler bfq registered May 17 00:33:48.022987 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 17 00:33:48.023002 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 17 00:33:48.023018 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 17 00:33:48.023033 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 17 00:33:48.023048 kernel: i8042: Warning: Keylock active May 17 00:33:48.023062 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 17 00:33:48.023079 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 17 00:33:48.023219 kernel: rtc_cmos 00:00: RTC can wake from S4 May 17 00:33:48.023335 kernel: rtc_cmos 00:00: registered as rtc0 May 17 00:33:48.023446 kernel: rtc_cmos 00:00: setting system clock to 2025-05-17T00:33:47 UTC (1747442027) May 17 00:33:48.023557 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram May 17 00:33:48.023575 kernel: intel_pstate: CPU model not supported May 17 00:33:48.023590 kernel: efifb: probing for efifb May 17 00:33:48.023605 kernel: efifb: framebuffer at 0x80000000, using 1876k, total 1875k May 17 00:33:48.023625 kernel: efifb: mode is 800x600x32, linelength=3200, pages=1 May 17 00:33:48.023650 kernel: efifb: scrolling: redraw May 17 00:33:48.023666 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 May 17 00:33:48.023693 kernel: Console: switching to colour frame buffer device 100x37 May 17 00:33:48.023709 kernel: fb0: EFI VGA frame buffer device May 17 00:33:48.023725 kernel: pstore: Registered efi as persistent store backend May 17 00:33:48.023763 kernel: NET: Registered PF_INET6 protocol family May 17 00:33:48.023782 kernel: Segment Routing with IPv6 May 17 00:33:48.023798 kernel: In-situ OAM (IOAM) with IPv6 May 17 00:33:48.023816 kernel: NET: Registered PF_PACKET protocol family May 17 00:33:48.023831 kernel: Key type dns_resolver registered May 17 00:33:48.023847 kernel: IPI shorthand broadcast: enabled May 17 00:33:48.023862 kernel: sched_clock: Marking stable (355281118, 128497270)->(547290118, -63511730) May 17 00:33:48.023878 kernel: registered taskstats version 1 May 17 00:33:48.023894 kernel: Loading compiled-in X.509 certificates May 17 00:33:48.023909 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.182-flatcar: 01ca23caa8e5879327538f9287e5164b3e97ac0c' May 17 00:33:48.023925 kernel: Key type .fscrypt registered May 17 00:33:48.023940 kernel: Key type fscrypt-provisioning registered May 17 00:33:48.023959 kernel: pstore: Using crash dump compression: deflate May 17 00:33:48.023975 kernel: ima: No TPM chip found, activating TPM-bypass! May 17 00:33:48.023991 kernel: ima: Allocated hash algorithm: sha1 May 17 00:33:48.024006 kernel: ima: No architecture policies found May 17 00:33:48.024024 kernel: clk: Disabling unused clocks May 17 00:33:48.024039 kernel: Freeing unused kernel image (initmem) memory: 47472K May 17 00:33:48.024055 kernel: Write protecting the kernel read-only data: 28672k May 17 00:33:48.024071 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 17 00:33:48.024088 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 17 00:33:48.024106 kernel: Run /init as init process May 17 00:33:48.024122 kernel: with arguments: May 17 00:33:48.024138 kernel: /init May 17 00:33:48.024153 kernel: with environment: May 17 00:33:48.024169 kernel: HOME=/ May 17 00:33:48.024184 kernel: TERM=linux May 17 00:33:48.024200 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 17 00:33:48.024220 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:33:48.024241 systemd[1]: Detected virtualization amazon. May 17 00:33:48.024258 systemd[1]: Detected architecture x86-64. May 17 00:33:48.024274 systemd[1]: Running in initrd. May 17 00:33:48.024289 systemd[1]: No hostname configured, using default hostname. May 17 00:33:48.024305 systemd[1]: Hostname set to . May 17 00:33:48.024322 systemd[1]: Initializing machine ID from VM UUID. May 17 00:33:48.024338 systemd[1]: Queued start job for default target initrd.target. May 17 00:33:48.024354 systemd[1]: Started systemd-ask-password-console.path. May 17 00:33:48.024373 systemd[1]: Reached target cryptsetup.target. May 17 00:33:48.024390 systemd[1]: Reached target paths.target. May 17 00:33:48.024406 systemd[1]: Reached target slices.target. May 17 00:33:48.024422 systemd[1]: Reached target swap.target. May 17 00:33:48.024438 systemd[1]: Reached target timers.target. May 17 00:33:48.024460 systemd[1]: Listening on iscsid.socket. May 17 00:33:48.024477 systemd[1]: Listening on iscsiuio.socket. May 17 00:33:48.024493 systemd[1]: Listening on systemd-journald-audit.socket. May 17 00:33:48.024510 systemd[1]: Listening on systemd-journald-dev-log.socket. May 17 00:33:48.024526 systemd[1]: Listening on systemd-journald.socket. May 17 00:33:48.024542 systemd[1]: Listening on systemd-networkd.socket. May 17 00:33:48.024559 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:33:48.024575 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:33:48.024595 systemd[1]: Reached target sockets.target. May 17 00:33:48.024611 systemd[1]: Starting kmod-static-nodes.service... May 17 00:33:48.024627 systemd[1]: Finished network-cleanup.service. May 17 00:33:48.024643 systemd[1]: Starting systemd-fsck-usr.service... May 17 00:33:48.024660 systemd[1]: Starting systemd-journald.service... May 17 00:33:48.024688 systemd[1]: Starting systemd-modules-load.service... May 17 00:33:48.024704 systemd[1]: Starting systemd-resolved.service... May 17 00:33:48.024721 systemd[1]: Starting systemd-vconsole-setup.service... May 17 00:33:48.024737 systemd[1]: Finished kmod-static-nodes.service. May 17 00:33:48.024756 systemd[1]: Finished systemd-fsck-usr.service. May 17 00:33:48.024772 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 17 00:33:48.024790 kernel: audit: type=1130 audit(1747442028.010:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:48.024806 systemd[1]: Finished systemd-vconsole-setup.service. May 17 00:33:48.024824 kernel: audit: type=1130 audit(1747442028.021:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:48.024846 systemd-journald[185]: Journal started May 17 00:33:48.024929 systemd-journald[185]: Runtime Journal (/run/log/journal/ec22c9ed2fb098a66e1bef860bea6587) is 4.8M, max 38.3M, 33.5M free. May 17 00:33:48.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:48.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:48.007598 systemd-modules-load[186]: Inserted module 'overlay' May 17 00:33:48.030805 systemd[1]: Started systemd-journald.service. May 17 00:33:48.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:48.039732 kernel: audit: type=1130 audit(1747442028.031:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:48.040030 systemd[1]: Starting dracut-cmdline-ask.service... May 17 00:33:48.043438 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 17 00:33:48.057350 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 17 00:33:48.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:48.069718 kernel: audit: type=1130 audit(1747442028.057:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:48.076867 systemd[1]: Finished dracut-cmdline-ask.service. May 17 00:33:48.079194 systemd[1]: Starting dracut-cmdline.service... May 17 00:33:48.081761 systemd-resolved[187]: Positive Trust Anchors: May 17 00:33:48.081772 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:33:48.116299 kernel: audit: type=1130 audit(1747442028.077:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:48.116337 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 17 00:33:48.116358 kernel: audit: type=1130 audit(1747442028.107:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:48.116378 kernel: Bridge firewalling registered May 17 00:33:48.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:48.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:48.081827 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:33:48.095921 systemd-resolved[187]: Defaulting to hostname 'linux'. May 17 00:33:48.127832 dracut-cmdline[202]: dracut-dracut-053 May 17 00:33:48.127832 dracut-cmdline[202]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA May 17 00:33:48.127832 dracut-cmdline[202]: BEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:33:48.097218 systemd[1]: Started systemd-resolved.service. May 17 00:33:48.108025 systemd[1]: Reached target nss-lookup.target. May 17 00:33:48.108850 systemd-modules-load[186]: Inserted module 'br_netfilter' May 17 00:33:48.151722 kernel: SCSI subsystem initialized May 17 00:33:48.168868 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 17 00:33:48.168935 kernel: device-mapper: uevent: version 1.0.3 May 17 00:33:48.171464 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 17 00:33:48.176062 systemd-modules-load[186]: Inserted module 'dm_multipath' May 17 00:33:48.177548 systemd[1]: Finished systemd-modules-load.service. May 17 00:33:48.189053 kernel: audit: type=1130 audit(1747442028.177:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:48.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:48.187402 systemd[1]: Starting systemd-sysctl.service... May 17 00:33:48.197501 systemd[1]: Finished systemd-sysctl.service. May 17 00:33:48.206063 kernel: audit: type=1130 audit(1747442028.197:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:48.197000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:48.217704 kernel: Loading iSCSI transport class v2.0-870. May 17 00:33:48.236713 kernel: iscsi: registered transport (tcp) May 17 00:33:48.261386 kernel: iscsi: registered transport (qla4xxx) May 17 00:33:48.261474 kernel: QLogic iSCSI HBA Driver May 17 00:33:48.293082 systemd[1]: Finished dracut-cmdline.service. May 17 00:33:48.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:48.295085 systemd[1]: Starting dracut-pre-udev.service... May 17 00:33:48.302613 kernel: audit: type=1130 audit(1747442028.293:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:48.348743 kernel: raid6: avx512x4 gen() 18092 MB/s May 17 00:33:48.366730 kernel: raid6: avx512x4 xor() 7892 MB/s May 17 00:33:48.384712 kernel: raid6: avx512x2 gen() 17912 MB/s May 17 00:33:48.402714 kernel: raid6: avx512x2 xor() 24352 MB/s May 17 00:33:48.420721 kernel: raid6: avx512x1 gen() 17988 MB/s May 17 00:33:48.438735 kernel: raid6: avx512x1 xor() 21940 MB/s May 17 00:33:48.456717 kernel: raid6: avx2x4 gen() 17793 MB/s May 17 00:33:48.474725 kernel: raid6: avx2x4 xor() 7519 MB/s May 17 00:33:48.492719 kernel: raid6: avx2x2 gen() 17670 MB/s May 17 00:33:48.510725 kernel: raid6: avx2x2 xor() 18178 MB/s May 17 00:33:48.528711 kernel: raid6: avx2x1 gen() 13712 MB/s May 17 00:33:48.546707 kernel: raid6: avx2x1 xor() 15775 MB/s May 17 00:33:48.564724 kernel: raid6: sse2x4 gen() 9587 MB/s May 17 00:33:48.582725 kernel: raid6: sse2x4 xor() 6101 MB/s May 17 00:33:48.600716 kernel: raid6: sse2x2 gen() 10541 MB/s May 17 00:33:48.618736 kernel: raid6: sse2x2 xor() 6172 MB/s May 17 00:33:48.636720 kernel: raid6: sse2x1 gen() 9391 MB/s May 17 00:33:48.654787 kernel: raid6: sse2x1 xor() 4877 MB/s May 17 00:33:48.654839 kernel: raid6: using algorithm avx512x4 gen() 18092 MB/s May 17 00:33:48.654859 kernel: raid6: .... xor() 7892 MB/s, rmw enabled May 17 00:33:48.655848 kernel: raid6: using avx512x2 recovery algorithm May 17 00:33:48.670706 kernel: xor: automatically using best checksumming function avx May 17 00:33:48.773709 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 17 00:33:48.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:48.782000 audit: BPF prog-id=7 op=LOAD May 17 00:33:48.782000 audit: BPF prog-id=8 op=LOAD May 17 00:33:48.782426 systemd[1]: Finished dracut-pre-udev.service. May 17 00:33:48.783855 systemd[1]: Starting systemd-udevd.service... May 17 00:33:48.797497 systemd-udevd[385]: Using default interface naming scheme 'v252'. May 17 00:33:48.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:48.802873 systemd[1]: Started systemd-udevd.service. May 17 00:33:48.805557 systemd[1]: Starting dracut-pre-trigger.service... May 17 00:33:48.825169 dracut-pre-trigger[390]: rd.md=0: removing MD RAID activation May 17 00:33:48.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:48.856973 systemd[1]: Finished dracut-pre-trigger.service. May 17 00:33:48.858206 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:33:48.900000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:48.900090 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:33:48.961749 kernel: cryptd: max_cpu_qlen set to 1000 May 17 00:33:48.979764 kernel: ena 0000:00:05.0: ENA device version: 0.10 May 17 00:33:49.003067 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 May 17 00:33:49.003223 kernel: ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy. May 17 00:33:49.003346 kernel: AVX2 version of gcm_enc/dec engaged. May 17 00:33:49.003362 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem 80400000, mac addr 06:97:4d:8c:83:ed May 17 00:33:49.003485 kernel: nvme nvme0: pci function 0000:00:04.0 May 17 00:33:49.003638 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 May 17 00:33:49.006698 kernel: AES CTR mode by8 optimization enabled May 17 00:33:49.014698 kernel: nvme nvme0: 2/0/0 default/read/poll queues May 17 00:33:49.021397 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 17 00:33:49.021468 kernel: GPT:9289727 != 16777215 May 17 00:33:49.021499 kernel: GPT:Alternate GPT header not at the end of the disk. May 17 00:33:49.024227 kernel: GPT:9289727 != 16777215 May 17 00:33:49.024293 kernel: GPT: Use GNU Parted to correct GPT errors. May 17 00:33:49.027237 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 May 17 00:33:49.030169 (udev-worker)[438]: Network interface NamePolicy= disabled on kernel command line. May 17 00:33:49.099791 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (432) May 17 00:33:49.142024 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 17 00:33:49.158259 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:33:49.183743 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 17 00:33:49.191528 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 17 00:33:49.192278 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 17 00:33:49.198813 systemd[1]: Starting disk-uuid.service... May 17 00:33:49.205792 disk-uuid[593]: Primary Header is updated. May 17 00:33:49.205792 disk-uuid[593]: Secondary Entries is updated. May 17 00:33:49.205792 disk-uuid[593]: Secondary Header is updated. May 17 00:33:49.214711 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 May 17 00:33:49.221299 kernel: GPT:disk_guids don't match. May 17 00:33:49.221364 kernel: GPT: Use GNU Parted to correct GPT errors. May 17 00:33:49.221384 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 May 17 00:33:49.229710 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 May 17 00:33:50.230401 disk-uuid[594]: The operation has completed successfully. May 17 00:33:50.231150 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 May 17 00:33:50.370067 systemd[1]: disk-uuid.service: Deactivated successfully. May 17 00:33:50.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:50.370000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:50.370181 systemd[1]: Finished disk-uuid.service. May 17 00:33:50.372015 systemd[1]: Starting verity-setup.service... May 17 00:33:50.400700 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" May 17 00:33:50.504229 systemd[1]: Found device dev-mapper-usr.device. May 17 00:33:50.506311 systemd[1]: Mounting sysusr-usr.mount... May 17 00:33:50.509760 systemd[1]: Finished verity-setup.service. May 17 00:33:50.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:50.595781 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 17 00:33:50.596287 systemd[1]: Mounted sysusr-usr.mount. May 17 00:33:50.597038 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 17 00:33:50.597763 systemd[1]: Starting ignition-setup.service... May 17 00:33:50.600665 systemd[1]: Starting parse-ip-for-networkd.service... May 17 00:33:50.630357 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm May 17 00:33:50.630425 kernel: BTRFS info (device nvme0n1p6): using free space tree May 17 00:33:50.630437 kernel: BTRFS info (device nvme0n1p6): has skinny extents May 17 00:33:50.655765 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations May 17 00:33:50.669849 systemd[1]: mnt-oem.mount: Deactivated successfully. May 17 00:33:50.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:50.683952 systemd[1]: Finished ignition-setup.service. May 17 00:33:50.686085 systemd[1]: Starting ignition-fetch-offline.service... May 17 00:33:50.692544 systemd[1]: Finished parse-ip-for-networkd.service. May 17 00:33:50.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:50.693000 audit: BPF prog-id=9 op=LOAD May 17 00:33:50.694854 systemd[1]: Starting systemd-networkd.service... May 17 00:33:50.719015 systemd-networkd[1105]: lo: Link UP May 17 00:33:50.719027 systemd-networkd[1105]: lo: Gained carrier May 17 00:33:50.720116 systemd-networkd[1105]: Enumeration completed May 17 00:33:50.720241 systemd[1]: Started systemd-networkd.service. May 17 00:33:50.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:50.721045 systemd-networkd[1105]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:33:50.723222 systemd[1]: Reached target network.target. May 17 00:33:50.725580 systemd-networkd[1105]: eth0: Link UP May 17 00:33:50.725587 systemd-networkd[1105]: eth0: Gained carrier May 17 00:33:50.727970 systemd[1]: Starting iscsiuio.service... May 17 00:33:50.736276 systemd[1]: Started iscsiuio.service. May 17 00:33:50.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:50.738496 systemd[1]: Starting iscsid.service... May 17 00:33:50.741828 systemd-networkd[1105]: eth0: DHCPv4 address 172.31.29.247/20, gateway 172.31.16.1 acquired from 172.31.16.1 May 17 00:33:50.746025 iscsid[1110]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 17 00:33:50.746025 iscsid[1110]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 17 00:33:50.746025 iscsid[1110]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 17 00:33:50.746025 iscsid[1110]: If using hardware iscsi like qla4xxx this message can be ignored. May 17 00:33:50.746025 iscsid[1110]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 17 00:33:50.746025 iscsid[1110]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 17 00:33:50.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:50.745217 systemd[1]: Started iscsid.service. May 17 00:33:50.747984 systemd[1]: Starting dracut-initqueue.service... May 17 00:33:50.764110 systemd[1]: Finished dracut-initqueue.service. May 17 00:33:50.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:50.765155 systemd[1]: Reached target remote-fs-pre.target. May 17 00:33:50.766307 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:33:50.767570 systemd[1]: Reached target remote-fs.target. May 17 00:33:50.770116 systemd[1]: Starting dracut-pre-mount.service... May 17 00:33:50.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:50.780902 systemd[1]: Finished dracut-pre-mount.service. May 17 00:33:51.406355 ignition[1101]: Ignition 2.14.0 May 17 00:33:51.406372 ignition[1101]: Stage: fetch-offline May 17 00:33:51.406523 ignition[1101]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:33:51.406580 ignition[1101]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 17 00:33:51.423756 ignition[1101]: no config dir at "/usr/lib/ignition/base.platform.d/aws" May 17 00:33:51.424895 ignition[1101]: Ignition finished successfully May 17 00:33:51.426502 systemd[1]: Finished ignition-fetch-offline.service. May 17 00:33:51.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:51.428641 systemd[1]: Starting ignition-fetch.service... May 17 00:33:51.437741 ignition[1129]: Ignition 2.14.0 May 17 00:33:51.437753 ignition[1129]: Stage: fetch May 17 00:33:51.437962 ignition[1129]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:33:51.437994 ignition[1129]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 17 00:33:51.445617 ignition[1129]: no config dir at "/usr/lib/ignition/base.platform.d/aws" May 17 00:33:51.446466 ignition[1129]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 17 00:33:51.458741 ignition[1129]: INFO : PUT result: OK May 17 00:33:51.461962 ignition[1129]: DEBUG : parsed url from cmdline: "" May 17 00:33:51.461962 ignition[1129]: INFO : no config URL provided May 17 00:33:51.461962 ignition[1129]: INFO : reading system config file "/usr/lib/ignition/user.ign" May 17 00:33:51.461962 ignition[1129]: INFO : no config at "/usr/lib/ignition/user.ign" May 17 00:33:51.465231 ignition[1129]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 17 00:33:51.465231 ignition[1129]: INFO : PUT result: OK May 17 00:33:51.465231 ignition[1129]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 May 17 00:33:51.465231 ignition[1129]: INFO : GET result: OK May 17 00:33:51.465231 ignition[1129]: DEBUG : parsing config with SHA512: 79cd1b3086800c89045f8a31150174d210e0a56e987a9fbfcbaf3dd89f017353a483cac6b4c2e1adc0ed9a6a33c6efcdd3eea3d6d281479a92259122298f4897 May 17 00:33:51.471091 unknown[1129]: fetched base config from "system" May 17 00:33:51.471106 unknown[1129]: fetched base config from "system" May 17 00:33:51.471119 unknown[1129]: fetched user config from "aws" May 17 00:33:51.473208 ignition[1129]: fetch: fetch complete May 17 00:33:51.473217 ignition[1129]: fetch: fetch passed May 17 00:33:51.473278 ignition[1129]: Ignition finished successfully May 17 00:33:51.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:51.475155 systemd[1]: Finished ignition-fetch.service. May 17 00:33:51.477203 systemd[1]: Starting ignition-kargs.service... May 17 00:33:51.487486 ignition[1135]: Ignition 2.14.0 May 17 00:33:51.487500 ignition[1135]: Stage: kargs May 17 00:33:51.487714 ignition[1135]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:33:51.487745 ignition[1135]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 17 00:33:51.495327 ignition[1135]: no config dir at "/usr/lib/ignition/base.platform.d/aws" May 17 00:33:51.496401 ignition[1135]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 17 00:33:51.497159 ignition[1135]: INFO : PUT result: OK May 17 00:33:51.499920 ignition[1135]: kargs: kargs passed May 17 00:33:51.499991 ignition[1135]: Ignition finished successfully May 17 00:33:51.501699 systemd[1]: Finished ignition-kargs.service. May 17 00:33:51.501000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:51.503398 systemd[1]: Starting ignition-disks.service... May 17 00:33:51.512815 ignition[1141]: Ignition 2.14.0 May 17 00:33:51.512829 ignition[1141]: Stage: disks May 17 00:33:51.513034 ignition[1141]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:33:51.513073 ignition[1141]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 17 00:33:51.521859 ignition[1141]: no config dir at "/usr/lib/ignition/base.platform.d/aws" May 17 00:33:51.522633 ignition[1141]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 17 00:33:51.523359 ignition[1141]: INFO : PUT result: OK May 17 00:33:51.525631 ignition[1141]: disks: disks passed May 17 00:33:51.525712 ignition[1141]: Ignition finished successfully May 17 00:33:51.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:51.527780 systemd[1]: Finished ignition-disks.service. May 17 00:33:51.528419 systemd[1]: Reached target initrd-root-device.target. May 17 00:33:51.528984 systemd[1]: Reached target local-fs-pre.target. May 17 00:33:51.529913 systemd[1]: Reached target local-fs.target. May 17 00:33:51.530827 systemd[1]: Reached target sysinit.target. May 17 00:33:51.531934 systemd[1]: Reached target basic.target. May 17 00:33:51.534075 systemd[1]: Starting systemd-fsck-root.service... May 17 00:33:51.566853 systemd-fsck[1149]: ROOT: clean, 619/553520 files, 56023/553472 blocks May 17 00:33:51.569877 systemd[1]: Finished systemd-fsck-root.service. May 17 00:33:51.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:51.571293 systemd[1]: Mounting sysroot.mount... May 17 00:33:51.589702 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 17 00:33:51.590828 systemd[1]: Mounted sysroot.mount. May 17 00:33:51.592065 systemd[1]: Reached target initrd-root-fs.target. May 17 00:33:51.601701 systemd[1]: Mounting sysroot-usr.mount... May 17 00:33:51.603448 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 17 00:33:51.604421 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 17 00:33:51.604450 systemd[1]: Reached target ignition-diskful.target. May 17 00:33:51.606371 systemd[1]: Mounted sysroot-usr.mount. May 17 00:33:51.625033 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 17 00:33:51.627166 systemd[1]: Starting initrd-setup-root.service... May 17 00:33:51.640126 initrd-setup-root[1171]: cut: /sysroot/etc/passwd: No such file or directory May 17 00:33:51.652753 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1166) May 17 00:33:51.654812 initrd-setup-root[1179]: cut: /sysroot/etc/group: No such file or directory May 17 00:33:51.658431 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm May 17 00:33:51.658460 kernel: BTRFS info (device nvme0n1p6): using free space tree May 17 00:33:51.658471 kernel: BTRFS info (device nvme0n1p6): has skinny extents May 17 00:33:51.661160 initrd-setup-root[1203]: cut: /sysroot/etc/shadow: No such file or directory May 17 00:33:51.665515 initrd-setup-root[1211]: cut: /sysroot/etc/gshadow: No such file or directory May 17 00:33:51.683862 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations May 17 00:33:51.710159 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 17 00:33:51.920357 systemd[1]: Finished initrd-setup-root.service. May 17 00:33:51.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:51.922214 systemd[1]: Starting ignition-mount.service... May 17 00:33:51.924330 systemd[1]: Starting sysroot-boot.service... May 17 00:33:51.934339 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. May 17 00:33:51.934473 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. May 17 00:33:51.950057 ignition[1231]: INFO : Ignition 2.14.0 May 17 00:33:51.951057 ignition[1231]: INFO : Stage: mount May 17 00:33:51.952108 ignition[1231]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:33:51.952108 ignition[1231]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 17 00:33:51.966598 ignition[1231]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" May 17 00:33:51.968170 ignition[1231]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 17 00:33:51.970351 ignition[1231]: INFO : PUT result: OK May 17 00:33:51.975410 systemd[1]: Finished sysroot-boot.service. May 17 00:33:51.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:51.976762 ignition[1231]: INFO : mount: mount passed May 17 00:33:51.976762 ignition[1231]: INFO : Ignition finished successfully May 17 00:33:51.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:51.976343 systemd[1]: Finished ignition-mount.service. May 17 00:33:51.978260 systemd[1]: Starting ignition-files.service... May 17 00:33:51.986944 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 17 00:33:52.006707 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1241) May 17 00:33:52.010476 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm May 17 00:33:52.010547 kernel: BTRFS info (device nvme0n1p6): using free space tree May 17 00:33:52.010566 kernel: BTRFS info (device nvme0n1p6): has skinny extents May 17 00:33:52.026707 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations May 17 00:33:52.029776 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 17 00:33:52.040652 ignition[1260]: INFO : Ignition 2.14.0 May 17 00:33:52.040652 ignition[1260]: INFO : Stage: files May 17 00:33:52.042818 ignition[1260]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:33:52.042818 ignition[1260]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 17 00:33:52.049387 ignition[1260]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" May 17 00:33:52.050334 ignition[1260]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 17 00:33:52.051200 ignition[1260]: INFO : PUT result: OK May 17 00:33:52.054145 ignition[1260]: DEBUG : files: compiled without relabeling support, skipping May 17 00:33:52.061370 ignition[1260]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 17 00:33:52.061370 ignition[1260]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 17 00:33:52.085017 ignition[1260]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 17 00:33:52.086437 ignition[1260]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 17 00:33:52.088006 unknown[1260]: wrote ssh authorized keys file for user: core May 17 00:33:52.088905 ignition[1260]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 17 00:33:52.090151 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 17 00:33:52.090151 ignition[1260]: INFO : GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 May 17 00:33:52.205856 ignition[1260]: INFO : GET result: OK May 17 00:33:52.485969 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 17 00:33:52.487767 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/eks/bootstrap.sh" May 17 00:33:52.489405 ignition[1260]: INFO : oem config not found in "/usr/share/oem", looking on oem partition May 17 00:33:52.496537 ignition[1260]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2505722923" May 17 00:33:52.498079 ignition[1260]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2505722923": device or resource busy May 17 00:33:52.498079 ignition[1260]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2505722923", trying btrfs: device or resource busy May 17 00:33:52.498079 ignition[1260]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2505722923" May 17 00:33:52.498079 ignition[1260]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2505722923" May 17 00:33:52.512170 ignition[1260]: INFO : op(3): [started] unmounting "/mnt/oem2505722923" May 17 00:33:52.513389 ignition[1260]: INFO : op(3): [finished] unmounting "/mnt/oem2505722923" May 17 00:33:52.513389 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" May 17 00:33:52.513389 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/install.sh" May 17 00:33:52.513389 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/install.sh" May 17 00:33:52.513389 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nginx.yaml" May 17 00:33:52.513389 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nginx.yaml" May 17 00:33:52.513389 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 17 00:33:52.513389 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 17 00:33:52.513389 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 17 00:33:52.513389 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 17 00:33:52.536396 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:33:52.536396 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:33:52.536396 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" May 17 00:33:52.536396 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" May 17 00:33:52.536396 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" May 17 00:33:52.536396 ignition[1260]: INFO : oem config not found in "/usr/share/oem", looking on oem partition May 17 00:33:52.536396 ignition[1260]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1030987142" May 17 00:33:52.536396 ignition[1260]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1030987142": device or resource busy May 17 00:33:52.536396 ignition[1260]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1030987142", trying btrfs: device or resource busy May 17 00:33:52.536396 ignition[1260]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1030987142" May 17 00:33:52.536396 ignition[1260]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1030987142" May 17 00:33:52.536396 ignition[1260]: INFO : op(6): [started] unmounting "/mnt/oem1030987142" May 17 00:33:52.536396 ignition[1260]: INFO : op(6): [finished] unmounting "/mnt/oem1030987142" May 17 00:33:52.536396 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" May 17 00:33:52.536396 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" May 17 00:33:52.536396 ignition[1260]: INFO : oem config not found in "/usr/share/oem", looking on oem partition May 17 00:33:52.566226 ignition[1260]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1814585732" May 17 00:33:52.566226 ignition[1260]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1814585732": device or resource busy May 17 00:33:52.566226 ignition[1260]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1814585732", trying btrfs: device or resource busy May 17 00:33:52.566226 ignition[1260]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1814585732" May 17 00:33:52.566226 ignition[1260]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1814585732" May 17 00:33:52.566226 ignition[1260]: INFO : op(9): [started] unmounting "/mnt/oem1814585732" May 17 00:33:52.566226 ignition[1260]: INFO : op(9): [finished] unmounting "/mnt/oem1814585732" May 17 00:33:52.566226 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" May 17 00:33:52.566226 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" May 17 00:33:52.566226 ignition[1260]: INFO : oem config not found in "/usr/share/oem", looking on oem partition May 17 00:33:52.566226 ignition[1260]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3850275783" May 17 00:33:52.566226 ignition[1260]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3850275783": device or resource busy May 17 00:33:52.566226 ignition[1260]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3850275783", trying btrfs: device or resource busy May 17 00:33:52.566226 ignition[1260]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3850275783" May 17 00:33:52.566226 ignition[1260]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3850275783" May 17 00:33:52.566226 ignition[1260]: INFO : op(c): [started] unmounting "/mnt/oem3850275783" May 17 00:33:52.566226 ignition[1260]: INFO : op(c): [finished] unmounting "/mnt/oem3850275783" May 17 00:33:52.566226 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" May 17 00:33:52.566226 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" May 17 00:33:52.566226 ignition[1260]: INFO : GET https://extensions.flatcar.org/extensions/kubernetes-v1.31.8-x86-64.raw: attempt #1 May 17 00:33:52.737847 systemd-networkd[1105]: eth0: Gained IPv6LL May 17 00:33:53.127269 ignition[1260]: INFO : GET result: OK May 17 00:33:53.753296 ignition[1260]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" May 17 00:33:53.753296 ignition[1260]: INFO : files: op(f): [started] processing unit "coreos-metadata-sshkeys@.service" May 17 00:33:53.753296 ignition[1260]: INFO : files: op(f): [finished] processing unit "coreos-metadata-sshkeys@.service" May 17 00:33:53.753296 ignition[1260]: INFO : files: op(10): [started] processing unit "amazon-ssm-agent.service" May 17 00:33:53.753296 ignition[1260]: INFO : files: op(10): op(11): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" May 17 00:33:53.760351 ignition[1260]: INFO : files: op(10): op(11): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" May 17 00:33:53.760351 ignition[1260]: INFO : files: op(10): [finished] processing unit "amazon-ssm-agent.service" May 17 00:33:53.760351 ignition[1260]: INFO : files: op(12): [started] processing unit "nvidia.service" May 17 00:33:53.760351 ignition[1260]: INFO : files: op(12): [finished] processing unit "nvidia.service" May 17 00:33:53.760351 ignition[1260]: INFO : files: op(13): [started] processing unit "prepare-helm.service" May 17 00:33:53.760351 ignition[1260]: INFO : files: op(13): op(14): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 17 00:33:53.760351 ignition[1260]: INFO : files: op(13): op(14): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 17 00:33:53.760351 ignition[1260]: INFO : files: op(13): [finished] processing unit "prepare-helm.service" May 17 00:33:53.760351 ignition[1260]: INFO : files: op(15): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 17 00:33:53.760351 ignition[1260]: INFO : files: op(15): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 17 00:33:53.760351 ignition[1260]: INFO : files: op(16): [started] setting preset to enabled for "amazon-ssm-agent.service" May 17 00:33:53.760351 ignition[1260]: INFO : files: op(16): [finished] setting preset to enabled for "amazon-ssm-agent.service" May 17 00:33:53.760351 ignition[1260]: INFO : files: op(17): [started] setting preset to enabled for "nvidia.service" May 17 00:33:53.760351 ignition[1260]: INFO : files: op(17): [finished] setting preset to enabled for "nvidia.service" May 17 00:33:53.760351 ignition[1260]: INFO : files: op(18): [started] setting preset to enabled for "prepare-helm.service" May 17 00:33:53.760351 ignition[1260]: INFO : files: op(18): [finished] setting preset to enabled for "prepare-helm.service" May 17 00:33:53.760351 ignition[1260]: INFO : files: createResultFile: createFiles: op(19): [started] writing file "/sysroot/etc/.ignition-result.json" May 17 00:33:53.760351 ignition[1260]: INFO : files: createResultFile: createFiles: op(19): [finished] writing file "/sysroot/etc/.ignition-result.json" May 17 00:33:53.760351 ignition[1260]: INFO : files: files passed May 17 00:33:53.760351 ignition[1260]: INFO : Ignition finished successfully May 17 00:33:53.829462 kernel: kauditd_printk_skb: 25 callbacks suppressed May 17 00:33:53.829506 kernel: audit: type=1130 audit(1747442033.763:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.829525 kernel: audit: type=1130 audit(1747442033.788:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.829545 kernel: audit: type=1131 audit(1747442033.789:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.829564 kernel: audit: type=1130 audit(1747442033.801:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.761891 systemd[1]: Finished ignition-files.service. May 17 00:33:53.770283 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 17 00:33:53.832876 initrd-setup-root-after-ignition[1285]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 17 00:33:53.775900 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 17 00:33:53.846784 kernel: audit: type=1130 audit(1747442033.835:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.846823 kernel: audit: type=1131 audit(1747442033.835:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.835000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.777061 systemd[1]: Starting ignition-quench.service... May 17 00:33:53.783221 systemd[1]: ignition-quench.service: Deactivated successfully. May 17 00:33:53.783357 systemd[1]: Finished ignition-quench.service. May 17 00:33:53.794400 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 17 00:33:53.801949 systemd[1]: Reached target ignition-complete.target. May 17 00:33:53.810379 systemd[1]: Starting initrd-parse-etc.service... May 17 00:33:53.833339 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 17 00:33:53.833455 systemd[1]: Finished initrd-parse-etc.service. May 17 00:33:53.835936 systemd[1]: Reached target initrd-fs.target. May 17 00:33:53.847802 systemd[1]: Reached target initrd.target. May 17 00:33:53.849345 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 17 00:33:53.850667 systemd[1]: Starting dracut-pre-pivot.service... May 17 00:33:53.866662 systemd[1]: Finished dracut-pre-pivot.service. May 17 00:33:53.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.868927 systemd[1]: Starting initrd-cleanup.service... May 17 00:33:53.876410 kernel: audit: type=1130 audit(1747442033.867:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.882370 systemd[1]: Stopped target nss-lookup.target. May 17 00:33:53.883283 systemd[1]: Stopped target remote-cryptsetup.target. May 17 00:33:53.884729 systemd[1]: Stopped target timers.target. May 17 00:33:53.885950 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 17 00:33:53.892208 kernel: audit: type=1131 audit(1747442033.886:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.886000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.886165 systemd[1]: Stopped dracut-pre-pivot.service. May 17 00:33:53.887408 systemd[1]: Stopped target initrd.target. May 17 00:33:53.893025 systemd[1]: Stopped target basic.target. May 17 00:33:53.894202 systemd[1]: Stopped target ignition-complete.target. May 17 00:33:53.895369 systemd[1]: Stopped target ignition-diskful.target. May 17 00:33:53.896636 systemd[1]: Stopped target initrd-root-device.target. May 17 00:33:53.897805 systemd[1]: Stopped target remote-fs.target. May 17 00:33:53.898953 systemd[1]: Stopped target remote-fs-pre.target. May 17 00:33:53.900260 systemd[1]: Stopped target sysinit.target. May 17 00:33:53.901448 systemd[1]: Stopped target local-fs.target. May 17 00:33:53.902621 systemd[1]: Stopped target local-fs-pre.target. May 17 00:33:53.903910 systemd[1]: Stopped target swap.target. May 17 00:33:53.911190 kernel: audit: type=1131 audit(1747442033.905:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.905000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.905014 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 17 00:33:53.905219 systemd[1]: Stopped dracut-pre-mount.service. May 17 00:33:53.918373 kernel: audit: type=1131 audit(1747442033.912:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.912000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.906408 systemd[1]: Stopped target cryptsetup.target. May 17 00:33:53.918000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.912076 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 17 00:33:53.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.912291 systemd[1]: Stopped dracut-initqueue.service. May 17 00:33:53.913479 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 17 00:33:53.913699 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 17 00:33:53.919293 systemd[1]: ignition-files.service: Deactivated successfully. May 17 00:33:53.919501 systemd[1]: Stopped ignition-files.service. May 17 00:33:53.921955 systemd[1]: Stopping ignition-mount.service... May 17 00:33:53.928985 iscsid[1110]: iscsid shutting down. May 17 00:33:53.930277 systemd[1]: Stopping iscsid.service... May 17 00:33:53.935065 systemd[1]: Stopping sysroot-boot.service... May 17 00:33:53.937481 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 17 00:33:53.938976 systemd[1]: Stopped systemd-udev-trigger.service. May 17 00:33:53.940000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.941793 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 17 00:33:53.943139 systemd[1]: Stopped dracut-pre-trigger.service. May 17 00:33:53.944000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.946644 ignition[1298]: INFO : Ignition 2.14.0 May 17 00:33:53.946644 ignition[1298]: INFO : Stage: umount May 17 00:33:53.950285 systemd[1]: iscsid.service: Deactivated successfully. May 17 00:33:53.952336 ignition[1298]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:33:53.952336 ignition[1298]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 17 00:33:53.953000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.958000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.950424 systemd[1]: Stopped iscsid.service. May 17 00:33:53.955986 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 17 00:33:53.956104 systemd[1]: Finished initrd-cleanup.service. May 17 00:33:53.964809 systemd[1]: Stopping iscsiuio.service... May 17 00:33:53.969305 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 17 00:33:53.969962 systemd[1]: iscsiuio.service: Deactivated successfully. May 17 00:33:53.974000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.970088 systemd[1]: Stopped iscsiuio.service. May 17 00:33:53.975139 systemd[1]: sysroot-boot.service: Deactivated successfully. May 17 00:33:53.977539 ignition[1298]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" May 17 00:33:53.977539 ignition[1298]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 17 00:33:53.977539 ignition[1298]: INFO : PUT result: OK May 17 00:33:53.978000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.975262 systemd[1]: Stopped sysroot-boot.service. May 17 00:33:53.981000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.983075 ignition[1298]: INFO : umount: umount passed May 17 00:33:53.983075 ignition[1298]: INFO : Ignition finished successfully May 17 00:33:53.982000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.981486 systemd[1]: ignition-mount.service: Deactivated successfully. May 17 00:33:53.985000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.981583 systemd[1]: Stopped ignition-mount.service. May 17 00:33:53.982498 systemd[1]: ignition-disks.service: Deactivated successfully. May 17 00:33:53.987000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.982569 systemd[1]: Stopped ignition-disks.service. May 17 00:33:53.983756 systemd[1]: ignition-kargs.service: Deactivated successfully. May 17 00:33:53.983822 systemd[1]: Stopped ignition-kargs.service. May 17 00:33:53.984897 systemd[1]: ignition-fetch.service: Deactivated successfully. May 17 00:33:53.984960 systemd[1]: Stopped ignition-fetch.service. May 17 00:33:53.986122 systemd[1]: Stopped target network.target. May 17 00:33:53.987234 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 17 00:33:53.996000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.987302 systemd[1]: Stopped ignition-fetch-offline.service. May 17 00:33:53.998000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.988542 systemd[1]: Stopped target paths.target. May 17 00:33:53.989645 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 17 00:33:53.989716 systemd[1]: Stopped systemd-ask-password-console.path. May 17 00:33:53.990802 systemd[1]: Stopped target slices.target. May 17 00:33:53.992860 systemd[1]: Stopped target sockets.target. May 17 00:33:53.994014 systemd[1]: iscsid.socket: Deactivated successfully. May 17 00:33:53.994074 systemd[1]: Closed iscsid.socket. May 17 00:33:54.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.995189 systemd[1]: iscsiuio.socket: Deactivated successfully. May 17 00:33:54.007000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.995237 systemd[1]: Closed iscsiuio.socket. May 17 00:33:54.009000 audit: BPF prog-id=6 op=UNLOAD May 17 00:33:53.996514 systemd[1]: ignition-setup.service: Deactivated successfully. May 17 00:33:53.996580 systemd[1]: Stopped ignition-setup.service. May 17 00:33:53.997661 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 17 00:33:53.997740 systemd[1]: Stopped initrd-setup-root.service. May 17 00:33:53.999061 systemd[1]: Stopping systemd-networkd.service... May 17 00:33:54.000495 systemd[1]: Stopping systemd-resolved.service... May 17 00:33:54.015000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:54.002754 systemd-networkd[1105]: eth0: DHCPv6 lease lost May 17 00:33:54.015000 audit: BPF prog-id=9 op=UNLOAD May 17 00:33:54.016000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:54.004110 systemd[1]: systemd-networkd.service: Deactivated successfully. May 17 00:33:54.017000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:54.004229 systemd[1]: Stopped systemd-networkd.service. May 17 00:33:54.007040 systemd[1]: systemd-resolved.service: Deactivated successfully. May 17 00:33:54.007156 systemd[1]: Stopped systemd-resolved.service. May 17 00:33:54.008600 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 17 00:33:54.008645 systemd[1]: Closed systemd-networkd.socket. May 17 00:33:54.010831 systemd[1]: Stopping network-cleanup.service... May 17 00:33:54.014628 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 17 00:33:54.014777 systemd[1]: Stopped parse-ip-for-networkd.service. May 17 00:33:54.015937 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 17 00:33:54.016005 systemd[1]: Stopped systemd-sysctl.service. May 17 00:33:54.017160 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 17 00:33:54.017221 systemd[1]: Stopped systemd-modules-load.service. May 17 00:33:54.018320 systemd[1]: Stopping systemd-udevd.service... May 17 00:33:54.025371 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 17 00:33:54.033000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:54.033128 systemd[1]: network-cleanup.service: Deactivated successfully. May 17 00:33:54.035000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:54.033325 systemd[1]: Stopped network-cleanup.service. May 17 00:33:54.034986 systemd[1]: systemd-udevd.service: Deactivated successfully. May 17 00:33:54.035168 systemd[1]: Stopped systemd-udevd.service. May 17 00:33:54.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:54.036763 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 17 00:33:54.040000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:54.036817 systemd[1]: Closed systemd-udevd-control.socket. May 17 00:33:54.041000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:54.037614 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 17 00:33:54.037663 systemd[1]: Closed systemd-udevd-kernel.socket. May 17 00:33:54.038700 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 17 00:33:54.038763 systemd[1]: Stopped dracut-pre-udev.service. May 17 00:33:54.039972 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 17 00:33:54.040029 systemd[1]: Stopped dracut-cmdline.service. May 17 00:33:54.041077 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 17 00:33:54.053000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:54.041129 systemd[1]: Stopped dracut-cmdline-ask.service. May 17 00:33:54.054000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:54.043289 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 17 00:33:54.055000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:54.052789 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 17 00:33:54.052888 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 17 00:33:54.054243 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 17 00:33:54.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:54.059000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:54.054314 systemd[1]: Stopped kmod-static-nodes.service. May 17 00:33:54.055295 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 17 00:33:54.055357 systemd[1]: Stopped systemd-vconsole-setup.service. May 17 00:33:54.057905 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 17 00:33:54.058635 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 17 00:33:54.058773 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 17 00:33:54.059981 systemd[1]: Reached target initrd-switch-root.target. May 17 00:33:54.062120 systemd[1]: Starting initrd-switch-root.service... May 17 00:33:54.077204 systemd[1]: Switching root. May 17 00:33:54.099129 systemd-journald[185]: Journal stopped May 17 00:34:01.296867 systemd-journald[185]: Received SIGTERM from PID 1 (systemd). May 17 00:34:01.296950 kernel: SELinux: Class mctp_socket not defined in policy. May 17 00:34:01.296972 kernel: SELinux: Class anon_inode not defined in policy. May 17 00:34:01.296989 kernel: SELinux: the above unknown classes and permissions will be allowed May 17 00:34:01.297013 kernel: SELinux: policy capability network_peer_controls=1 May 17 00:34:01.297032 kernel: SELinux: policy capability open_perms=1 May 17 00:34:01.297059 kernel: SELinux: policy capability extended_socket_class=1 May 17 00:34:01.297078 kernel: SELinux: policy capability always_check_network=0 May 17 00:34:01.297100 kernel: SELinux: policy capability cgroup_seclabel=1 May 17 00:34:01.297122 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 17 00:34:01.297139 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 17 00:34:01.297158 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 17 00:34:01.297176 systemd[1]: Successfully loaded SELinux policy in 102.049ms. May 17 00:34:01.297209 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 8.349ms. May 17 00:34:01.297239 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:34:01.297264 systemd[1]: Detected virtualization amazon. May 17 00:34:01.297284 systemd[1]: Detected architecture x86-64. May 17 00:34:01.297306 systemd[1]: Detected first boot. May 17 00:34:01.297327 systemd[1]: Initializing machine ID from VM UUID. May 17 00:34:01.297346 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 17 00:34:01.297365 systemd[1]: Populated /etc with preset unit settings. May 17 00:34:01.297388 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:34:01.298615 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:34:01.298692 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:34:01.298724 kernel: kauditd_printk_skb: 49 callbacks suppressed May 17 00:34:01.298747 kernel: audit: type=1334 audit(1747442040.242:88): prog-id=12 op=LOAD May 17 00:34:01.298765 kernel: audit: type=1334 audit(1747442040.242:89): prog-id=3 op=UNLOAD May 17 00:34:01.298784 kernel: audit: type=1334 audit(1747442040.246:90): prog-id=13 op=LOAD May 17 00:34:01.298804 kernel: audit: type=1334 audit(1747442040.250:91): prog-id=14 op=LOAD May 17 00:34:01.298828 kernel: audit: type=1334 audit(1747442040.250:92): prog-id=4 op=UNLOAD May 17 00:34:01.298845 kernel: audit: type=1334 audit(1747442040.250:93): prog-id=5 op=UNLOAD May 17 00:34:01.298864 kernel: audit: type=1334 audit(1747442040.254:94): prog-id=15 op=LOAD May 17 00:34:01.298884 kernel: audit: type=1334 audit(1747442040.254:95): prog-id=12 op=UNLOAD May 17 00:34:01.298903 kernel: audit: type=1334 audit(1747442040.266:96): prog-id=16 op=LOAD May 17 00:34:01.298922 kernel: audit: type=1334 audit(1747442040.281:97): prog-id=17 op=LOAD May 17 00:34:01.298942 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 17 00:34:01.298964 systemd[1]: Stopped initrd-switch-root.service. May 17 00:34:01.298985 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 17 00:34:01.299009 systemd[1]: Created slice system-addon\x2dconfig.slice. May 17 00:34:01.299030 systemd[1]: Created slice system-addon\x2drun.slice. May 17 00:34:01.299057 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. May 17 00:34:01.299080 systemd[1]: Created slice system-getty.slice. May 17 00:34:01.299105 systemd[1]: Created slice system-modprobe.slice. May 17 00:34:01.299127 systemd[1]: Created slice system-serial\x2dgetty.slice. May 17 00:34:01.299148 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 17 00:34:01.299171 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 17 00:34:01.299193 systemd[1]: Created slice user.slice. May 17 00:34:01.299215 systemd[1]: Started systemd-ask-password-console.path. May 17 00:34:01.299235 systemd[1]: Started systemd-ask-password-wall.path. May 17 00:34:01.299257 systemd[1]: Set up automount boot.automount. May 17 00:34:01.299287 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 17 00:34:01.299310 systemd[1]: Stopped target initrd-switch-root.target. May 17 00:34:01.299331 systemd[1]: Stopped target initrd-fs.target. May 17 00:34:01.299351 systemd[1]: Stopped target initrd-root-fs.target. May 17 00:34:01.299373 systemd[1]: Reached target integritysetup.target. May 17 00:34:01.299393 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:34:01.299413 systemd[1]: Reached target remote-fs.target. May 17 00:34:01.299445 systemd[1]: Reached target slices.target. May 17 00:34:01.299466 systemd[1]: Reached target swap.target. May 17 00:34:01.299490 systemd[1]: Reached target torcx.target. May 17 00:34:01.299511 systemd[1]: Reached target veritysetup.target. May 17 00:34:01.299532 systemd[1]: Listening on systemd-coredump.socket. May 17 00:34:01.299553 systemd[1]: Listening on systemd-initctl.socket. May 17 00:34:01.299576 systemd[1]: Listening on systemd-networkd.socket. May 17 00:34:01.299596 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:34:01.299617 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:34:01.299638 systemd[1]: Listening on systemd-userdbd.socket. May 17 00:34:01.299660 systemd[1]: Mounting dev-hugepages.mount... May 17 00:34:01.299707 systemd[1]: Mounting dev-mqueue.mount... May 17 00:34:01.299728 systemd[1]: Mounting media.mount... May 17 00:34:01.299746 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:34:01.299766 systemd[1]: Mounting sys-kernel-debug.mount... May 17 00:34:01.299784 systemd[1]: Mounting sys-kernel-tracing.mount... May 17 00:34:01.299801 systemd[1]: Mounting tmp.mount... May 17 00:34:01.299821 systemd[1]: Starting flatcar-tmpfiles.service... May 17 00:34:01.299841 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:34:01.299862 systemd[1]: Starting kmod-static-nodes.service... May 17 00:34:01.299881 systemd[1]: Starting modprobe@configfs.service... May 17 00:34:01.299903 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:34:01.299922 systemd[1]: Starting modprobe@drm.service... May 17 00:34:01.299941 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:34:01.299960 systemd[1]: Starting modprobe@fuse.service... May 17 00:34:01.299979 systemd[1]: Starting modprobe@loop.service... May 17 00:34:01.299999 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 17 00:34:01.300020 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 17 00:34:01.300042 systemd[1]: Stopped systemd-fsck-root.service. May 17 00:34:01.300064 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 17 00:34:01.300086 systemd[1]: Stopped systemd-fsck-usr.service. May 17 00:34:01.300107 systemd[1]: Stopped systemd-journald.service. May 17 00:34:01.300127 systemd[1]: Starting systemd-journald.service... May 17 00:34:01.300148 systemd[1]: Starting systemd-modules-load.service... May 17 00:34:01.300169 systemd[1]: Starting systemd-network-generator.service... May 17 00:34:01.300190 systemd[1]: Starting systemd-remount-fs.service... May 17 00:34:01.300212 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:34:01.300233 systemd[1]: verity-setup.service: Deactivated successfully. May 17 00:34:01.300254 systemd[1]: Stopped verity-setup.service. May 17 00:34:01.300279 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:34:01.300299 systemd[1]: Mounted dev-hugepages.mount. May 17 00:34:01.300319 systemd[1]: Mounted dev-mqueue.mount. May 17 00:34:01.300340 systemd[1]: Mounted media.mount. May 17 00:34:01.300361 kernel: fuse: init (API version 7.34) May 17 00:34:01.300382 systemd[1]: Mounted sys-kernel-debug.mount. May 17 00:34:01.300403 systemd[1]: Mounted sys-kernel-tracing.mount. May 17 00:34:01.300424 systemd[1]: Mounted tmp.mount. May 17 00:34:01.300445 systemd[1]: Finished kmod-static-nodes.service. May 17 00:34:01.300469 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 17 00:34:01.300490 systemd[1]: Finished modprobe@configfs.service. May 17 00:34:01.300510 kernel: loop: module loaded May 17 00:34:01.300531 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:34:01.300551 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:34:01.300573 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:34:01.300597 systemd[1]: Finished modprobe@drm.service. May 17 00:34:01.315953 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:34:01.316062 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:34:01.316086 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 17 00:34:01.316114 systemd-journald[1414]: Journal started May 17 00:34:01.316197 systemd-journald[1414]: Runtime Journal (/run/log/journal/ec22c9ed2fb098a66e1bef860bea6587) is 4.8M, max 38.3M, 33.5M free. May 17 00:33:54.957000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 17 00:33:55.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:33:55.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:33:55.156000 audit: BPF prog-id=10 op=LOAD May 17 00:33:55.156000 audit: BPF prog-id=10 op=UNLOAD May 17 00:33:55.156000 audit: BPF prog-id=11 op=LOAD May 17 00:33:55.156000 audit: BPF prog-id=11 op=UNLOAD May 17 00:33:55.448000 audit[1331]: AVC avc: denied { associate } for pid=1331 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 17 00:33:55.448000 audit[1331]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=1314 pid=1331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:55.448000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:33:55.452000 audit[1331]: AVC avc: denied { associate } for pid=1331 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 17 00:33:55.452000 audit[1331]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=1314 pid=1331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:55.452000 audit: CWD cwd="/" May 17 00:33:55.452000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:55.452000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:55.452000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:34:00.242000 audit: BPF prog-id=12 op=LOAD May 17 00:34:00.242000 audit: BPF prog-id=3 op=UNLOAD May 17 00:34:00.246000 audit: BPF prog-id=13 op=LOAD May 17 00:34:00.250000 audit: BPF prog-id=14 op=LOAD May 17 00:34:00.250000 audit: BPF prog-id=4 op=UNLOAD May 17 00:34:00.250000 audit: BPF prog-id=5 op=UNLOAD May 17 00:34:00.254000 audit: BPF prog-id=15 op=LOAD May 17 00:34:00.254000 audit: BPF prog-id=12 op=UNLOAD May 17 00:34:00.266000 audit: BPF prog-id=16 op=LOAD May 17 00:34:00.281000 audit: BPF prog-id=17 op=LOAD May 17 00:34:00.281000 audit: BPF prog-id=13 op=UNLOAD May 17 00:34:00.281000 audit: BPF prog-id=14 op=UNLOAD May 17 00:34:00.285000 audit: BPF prog-id=18 op=LOAD May 17 00:34:00.285000 audit: BPF prog-id=15 op=UNLOAD May 17 00:34:00.289000 audit: BPF prog-id=19 op=LOAD May 17 00:34:00.296000 audit: BPF prog-id=20 op=LOAD May 17 00:34:00.302000 audit: BPF prog-id=16 op=UNLOAD May 17 00:34:00.302000 audit: BPF prog-id=17 op=UNLOAD May 17 00:34:00.304000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:00.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:00.310000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:00.317000 audit: BPF prog-id=18 op=UNLOAD May 17 00:34:00.929000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:00.945000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:00.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:00.962000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:00.970000 audit: BPF prog-id=21 op=LOAD May 17 00:34:00.970000 audit: BPF prog-id=22 op=LOAD May 17 00:34:00.970000 audit: BPF prog-id=23 op=LOAD May 17 00:34:00.970000 audit: BPF prog-id=19 op=UNLOAD May 17 00:34:00.970000 audit: BPF prog-id=20 op=UNLOAD May 17 00:34:01.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:01.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:01.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:01.261000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:01.271000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:01.271000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:01.285000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 17 00:34:01.285000 audit[1414]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffe94641ba0 a2=4000 a3=7ffe94641c3c items=0 ppid=1 pid=1414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.285000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 17 00:34:01.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:01.285000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:01.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:01.308000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:55.412465 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2025-05-17T00:33:55Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:34:00.229622 systemd[1]: Queued start job for default target multi-user.target. May 17 00:34:01.335296 systemd[1]: Finished modprobe@fuse.service. May 17 00:34:01.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:01.335000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:55.423462 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2025-05-17T00:33:55Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:34:00.229637 systemd[1]: Unnecessary job was removed for dev-nvme0n1p6.device. May 17 00:33:55.423498 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2025-05-17T00:33:55Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:34:00.304019 systemd[1]: systemd-journald.service: Deactivated successfully. May 17 00:33:55.423638 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2025-05-17T00:33:55Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 17 00:33:55.423711 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2025-05-17T00:33:55Z" level=debug msg="skipped missing lower profile" missing profile=oem May 17 00:33:55.423765 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2025-05-17T00:33:55Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 17 00:33:55.423798 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2025-05-17T00:33:55Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 17 00:33:55.424068 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2025-05-17T00:33:55Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 17 00:33:55.424130 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2025-05-17T00:33:55Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:33:55.424151 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2025-05-17T00:33:55Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:33:55.433650 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2025-05-17T00:33:55Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 17 00:34:01.342787 systemd[1]: Started systemd-journald.service. May 17 00:34:01.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:55.433738 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2025-05-17T00:33:55Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 17 00:34:01.342791 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:33:55.433772 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2025-05-17T00:33:55Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 17 00:34:01.342971 systemd[1]: Finished modprobe@loop.service. May 17 00:33:55.433795 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2025-05-17T00:33:55Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 17 00:33:55.433825 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2025-05-17T00:33:55Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 17 00:33:55.433847 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2025-05-17T00:33:55Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 17 00:33:59.350867 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2025-05-17T00:33:59Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:33:59.351129 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2025-05-17T00:33:59Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:33:59.351262 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2025-05-17T00:33:59Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:33:59.351656 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2025-05-17T00:33:59Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:33:59.351726 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2025-05-17T00:33:59Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 17 00:33:59.351795 /usr/lib/systemd/system-generators/torcx-generator[1331]: time="2025-05-17T00:33:59Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 17 00:34:01.352000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:01.352000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:01.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:01.353622 systemd[1]: Finished systemd-modules-load.service. May 17 00:34:01.355160 systemd[1]: Finished systemd-network-generator.service. May 17 00:34:01.355000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:01.356547 systemd[1]: Finished systemd-remount-fs.service. May 17 00:34:01.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:01.364119 systemd[1]: Reached target network-pre.target. May 17 00:34:01.377737 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 17 00:34:01.382262 systemd[1]: Mounting sys-kernel-config.mount... May 17 00:34:01.395844 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 17 00:34:01.399823 systemd[1]: Starting systemd-hwdb-update.service... May 17 00:34:01.408900 systemd[1]: Starting systemd-journal-flush.service... May 17 00:34:01.412821 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:34:01.418938 systemd[1]: Starting systemd-random-seed.service... May 17 00:34:01.421695 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:34:01.426765 systemd[1]: Starting systemd-sysctl.service... May 17 00:34:01.436708 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 17 00:34:01.439297 systemd[1]: Mounted sys-kernel-config.mount. May 17 00:34:01.485978 systemd-journald[1414]: Time spent on flushing to /var/log/journal/ec22c9ed2fb098a66e1bef860bea6587 is 55.839ms for 1233 entries. May 17 00:34:01.485978 systemd-journald[1414]: System Journal (/var/log/journal/ec22c9ed2fb098a66e1bef860bea6587) is 8.0M, max 195.6M, 187.6M free. May 17 00:34:01.565793 systemd-journald[1414]: Received client request to flush runtime journal. May 17 00:34:01.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:01.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:01.555000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:01.486846 systemd[1]: Finished flatcar-tmpfiles.service. May 17 00:34:01.501717 systemd[1]: Starting systemd-sysusers.service... May 17 00:34:01.507609 systemd[1]: Finished systemd-random-seed.service. May 17 00:34:01.509975 systemd[1]: Reached target first-boot-complete.target. May 17 00:34:01.554930 systemd[1]: Finished systemd-sysctl.service. May 17 00:34:01.567150 systemd[1]: Finished systemd-journal-flush.service. May 17 00:34:01.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:01.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:01.580686 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:34:01.583247 systemd[1]: Starting systemd-udev-settle.service... May 17 00:34:01.602153 udevadm[1450]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 17 00:34:01.789000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:01.779918 systemd[1]: Finished systemd-sysusers.service. May 17 00:34:01.797043 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 17 00:34:02.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:02.033538 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 17 00:34:02.637288 systemd[1]: Finished systemd-hwdb-update.service. May 17 00:34:02.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:02.638000 audit: BPF prog-id=24 op=LOAD May 17 00:34:02.638000 audit: BPF prog-id=25 op=LOAD May 17 00:34:02.638000 audit: BPF prog-id=7 op=UNLOAD May 17 00:34:02.638000 audit: BPF prog-id=8 op=UNLOAD May 17 00:34:02.640221 systemd[1]: Starting systemd-udevd.service... May 17 00:34:02.665276 systemd-udevd[1453]: Using default interface naming scheme 'v252'. May 17 00:34:02.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:02.759000 audit: BPF prog-id=26 op=LOAD May 17 00:34:02.757007 systemd[1]: Started systemd-udevd.service. May 17 00:34:02.761097 systemd[1]: Starting systemd-networkd.service... May 17 00:34:02.789000 audit: BPF prog-id=27 op=LOAD May 17 00:34:02.789000 audit: BPF prog-id=28 op=LOAD May 17 00:34:02.789000 audit: BPF prog-id=29 op=LOAD May 17 00:34:02.791372 systemd[1]: Starting systemd-userdbd.service... May 17 00:34:02.819915 (udev-worker)[1459]: Network interface NamePolicy= disabled on kernel command line. May 17 00:34:02.824137 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 17 00:34:02.858000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:02.858548 systemd[1]: Started systemd-userdbd.service. May 17 00:34:02.903695 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 17 00:34:02.922734 kernel: ACPI: button: Power Button [PWRF] May 17 00:34:02.928698 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 May 17 00:34:02.942000 audit[1463]: AVC avc: denied { confidentiality } for pid=1463 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 17 00:34:02.942000 audit[1463]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=563a561530c0 a1=338ac a2=7fbc09d13bc5 a3=5 items=110 ppid=1453 pid=1463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:02.942000 audit: CWD cwd="/" May 17 00:34:02.942000 audit: PATH item=0 name=(null) inode=43 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=1 name=(null) inode=14871 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=2 name=(null) inode=14871 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=3 name=(null) inode=14872 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=4 name=(null) inode=14871 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=5 name=(null) inode=14873 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=6 name=(null) inode=14871 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=7 name=(null) inode=14874 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=8 name=(null) inode=14874 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=9 name=(null) inode=14875 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=10 name=(null) inode=14874 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=11 name=(null) inode=14876 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=12 name=(null) inode=14874 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=13 name=(null) inode=14877 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=14 name=(null) inode=14874 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=15 name=(null) inode=14878 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=16 name=(null) inode=14874 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=17 name=(null) inode=14879 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=18 name=(null) inode=14871 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=19 name=(null) inode=14880 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=20 name=(null) inode=14880 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=21 name=(null) inode=14881 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=22 name=(null) inode=14880 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=23 name=(null) inode=14882 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=24 name=(null) inode=14880 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=25 name=(null) inode=14883 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=26 name=(null) inode=14880 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=27 name=(null) inode=14884 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=28 name=(null) inode=14880 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=29 name=(null) inode=14885 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=30 name=(null) inode=14871 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=31 name=(null) inode=14886 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=32 name=(null) inode=14886 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=33 name=(null) inode=14887 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=34 name=(null) inode=14886 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=35 name=(null) inode=14888 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=36 name=(null) inode=14886 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=37 name=(null) inode=14889 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=38 name=(null) inode=14886 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=39 name=(null) inode=14890 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=40 name=(null) inode=14886 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=41 name=(null) inode=14891 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=42 name=(null) inode=14871 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=43 name=(null) inode=14892 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=44 name=(null) inode=14892 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=45 name=(null) inode=14893 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=46 name=(null) inode=14892 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=47 name=(null) inode=14894 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=48 name=(null) inode=14892 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=49 name=(null) inode=14895 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=50 name=(null) inode=14892 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=51 name=(null) inode=14896 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=52 name=(null) inode=14892 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=53 name=(null) inode=14897 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=54 name=(null) inode=43 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=55 name=(null) inode=14898 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=56 name=(null) inode=14898 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=57 name=(null) inode=14899 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=58 name=(null) inode=14898 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=59 name=(null) inode=14900 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=60 name=(null) inode=14898 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=61 name=(null) inode=14901 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=62 name=(null) inode=14901 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=63 name=(null) inode=14902 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=64 name=(null) inode=14901 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=65 name=(null) inode=14903 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=66 name=(null) inode=14901 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=67 name=(null) inode=14904 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=68 name=(null) inode=14901 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=69 name=(null) inode=14905 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=70 name=(null) inode=14901 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=71 name=(null) inode=14906 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=72 name=(null) inode=14898 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=73 name=(null) inode=14907 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=74 name=(null) inode=14907 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=75 name=(null) inode=14908 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=76 name=(null) inode=14907 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=77 name=(null) inode=14909 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=78 name=(null) inode=14907 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=79 name=(null) inode=14910 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=80 name=(null) inode=14907 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=81 name=(null) inode=14911 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=82 name=(null) inode=14907 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=83 name=(null) inode=14912 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=84 name=(null) inode=14898 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=85 name=(null) inode=14913 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=86 name=(null) inode=14913 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=87 name=(null) inode=14914 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=88 name=(null) inode=14913 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=89 name=(null) inode=14915 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=90 name=(null) inode=14913 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=91 name=(null) inode=14916 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=92 name=(null) inode=14913 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=93 name=(null) inode=14917 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=94 name=(null) inode=14913 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=95 name=(null) inode=14918 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=96 name=(null) inode=14898 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=97 name=(null) inode=14919 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=98 name=(null) inode=14919 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=99 name=(null) inode=14920 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=100 name=(null) inode=14919 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=101 name=(null) inode=14921 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=102 name=(null) inode=14919 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=103 name=(null) inode=14922 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=104 name=(null) inode=14919 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=105 name=(null) inode=14923 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=106 name=(null) inode=14919 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=107 name=(null) inode=14924 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.942000 audit: PATH item=109 name=(null) inode=14925 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:02.956736 kernel: ACPI: button: Sleep Button [SLPF] May 17 00:34:02.942000 audit: PROCTITLE proctitle="(udev-worker)" May 17 00:34:02.995899 systemd-networkd[1462]: lo: Link UP May 17 00:34:02.995915 systemd-networkd[1462]: lo: Gained carrier May 17 00:34:02.996519 systemd-networkd[1462]: Enumeration completed May 17 00:34:02.996649 systemd[1]: Started systemd-networkd.service. May 17 00:34:02.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:02.999194 systemd[1]: Starting systemd-networkd-wait-online.service... May 17 00:34:03.000637 systemd-networkd[1462]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:34:03.006719 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:34:03.007241 systemd-networkd[1462]: eth0: Link UP May 17 00:34:03.007559 systemd-networkd[1462]: eth0: Gained carrier May 17 00:34:03.017868 systemd-networkd[1462]: eth0: DHCPv4 address 172.31.29.247/20, gateway 172.31.16.1 acquired from 172.31.16.1 May 17 00:34:03.020699 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr May 17 00:34:03.043705 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input4 May 17 00:34:03.051699 kernel: mousedev: PS/2 mouse device common for all mice May 17 00:34:03.148549 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:34:03.149552 systemd[1]: Finished systemd-udev-settle.service. May 17 00:34:03.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:03.151907 systemd[1]: Starting lvm2-activation-early.service... May 17 00:34:03.251615 lvm[1567]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:34:03.277997 systemd[1]: Finished lvm2-activation-early.service. May 17 00:34:03.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:03.278742 systemd[1]: Reached target cryptsetup.target. May 17 00:34:03.280922 systemd[1]: Starting lvm2-activation.service... May 17 00:34:03.286153 lvm[1568]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:34:03.312523 systemd[1]: Finished lvm2-activation.service. May 17 00:34:03.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:03.313479 systemd[1]: Reached target local-fs-pre.target. May 17 00:34:03.314053 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 17 00:34:03.314094 systemd[1]: Reached target local-fs.target. May 17 00:34:03.314601 systemd[1]: Reached target machines.target. May 17 00:34:03.316576 systemd[1]: Starting ldconfig.service... May 17 00:34:03.318860 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:34:03.318957 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:34:03.320781 systemd[1]: Starting systemd-boot-update.service... May 17 00:34:03.323059 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 17 00:34:03.325922 systemd[1]: Starting systemd-machine-id-commit.service... May 17 00:34:03.332344 systemd[1]: Starting systemd-sysext.service... May 17 00:34:03.344129 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1570 (bootctl) May 17 00:34:03.345934 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 17 00:34:03.354819 systemd[1]: Unmounting usr-share-oem.mount... May 17 00:34:03.361872 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 17 00:34:03.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:03.366600 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 17 00:34:03.366914 systemd[1]: Unmounted usr-share-oem.mount. May 17 00:34:03.383727 kernel: loop0: detected capacity change from 0 to 221472 May 17 00:34:03.556573 systemd-fsck[1580]: fsck.fat 4.2 (2021-01-31) May 17 00:34:03.556573 systemd-fsck[1580]: /dev/nvme0n1p1: 790 files, 120726/258078 clusters May 17 00:34:03.558378 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 17 00:34:03.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:03.561865 systemd[1]: Mounting boot.mount... May 17 00:34:03.590211 systemd[1]: Mounted boot.mount. May 17 00:34:03.644840 systemd[1]: Finished systemd-boot-update.service. May 17 00:34:03.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:03.672503 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 17 00:34:03.673206 systemd[1]: Finished systemd-machine-id-commit.service. May 17 00:34:03.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:03.688704 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 17 00:34:03.720901 kernel: loop1: detected capacity change from 0 to 221472 May 17 00:34:03.745470 (sd-sysext)[1596]: Using extensions 'kubernetes'. May 17 00:34:03.747791 (sd-sysext)[1596]: Merged extensions into '/usr'. May 17 00:34:03.768438 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:34:03.770233 systemd[1]: Mounting usr-share-oem.mount... May 17 00:34:03.771381 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:34:03.773381 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:34:03.776526 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:34:03.781271 systemd[1]: Starting modprobe@loop.service... May 17 00:34:03.782201 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:34:03.782402 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:34:03.782582 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:34:03.786518 systemd[1]: Mounted usr-share-oem.mount. May 17 00:34:03.787830 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:34:03.788010 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:34:03.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:03.788000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:03.789256 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:34:03.789431 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:34:03.789000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:03.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:03.790482 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:34:03.790638 systemd[1]: Finished modprobe@loop.service. May 17 00:34:03.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:03.790000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:03.792117 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:34:03.792290 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:34:03.793742 systemd[1]: Finished systemd-sysext.service. May 17 00:34:03.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:03.795823 systemd[1]: Starting ensure-sysext.service... May 17 00:34:03.798168 systemd[1]: Starting systemd-tmpfiles-setup.service... May 17 00:34:03.807748 systemd[1]: Reloading. May 17 00:34:03.834433 systemd-tmpfiles[1603]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 17 00:34:03.836496 systemd-tmpfiles[1603]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 17 00:34:03.843167 systemd-tmpfiles[1603]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 17 00:34:03.896336 /usr/lib/systemd/system-generators/torcx-generator[1622]: time="2025-05-17T00:34:03Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:34:03.896385 /usr/lib/systemd/system-generators/torcx-generator[1622]: time="2025-05-17T00:34:03Z" level=info msg="torcx already run" May 17 00:34:04.034869 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:34:04.034896 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:34:04.069253 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:34:04.155000 audit: BPF prog-id=30 op=LOAD May 17 00:34:04.155000 audit: BPF prog-id=31 op=LOAD May 17 00:34:04.155000 audit: BPF prog-id=24 op=UNLOAD May 17 00:34:04.155000 audit: BPF prog-id=25 op=UNLOAD May 17 00:34:04.157000 audit: BPF prog-id=32 op=LOAD May 17 00:34:04.157000 audit: BPF prog-id=26 op=UNLOAD May 17 00:34:04.158000 audit: BPF prog-id=33 op=LOAD May 17 00:34:04.158000 audit: BPF prog-id=21 op=UNLOAD May 17 00:34:04.158000 audit: BPF prog-id=34 op=LOAD May 17 00:34:04.158000 audit: BPF prog-id=35 op=LOAD May 17 00:34:04.158000 audit: BPF prog-id=22 op=UNLOAD May 17 00:34:04.158000 audit: BPF prog-id=23 op=UNLOAD May 17 00:34:04.161000 audit: BPF prog-id=36 op=LOAD May 17 00:34:04.161000 audit: BPF prog-id=27 op=UNLOAD May 17 00:34:04.161000 audit: BPF prog-id=37 op=LOAD May 17 00:34:04.161000 audit: BPF prog-id=38 op=LOAD May 17 00:34:04.161000 audit: BPF prog-id=28 op=UNLOAD May 17 00:34:04.161000 audit: BPF prog-id=29 op=UNLOAD May 17 00:34:04.165327 systemd[1]: Finished systemd-tmpfiles-setup.service. May 17 00:34:04.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:04.172383 systemd[1]: Starting audit-rules.service... May 17 00:34:04.174635 systemd[1]: Starting clean-ca-certificates.service... May 17 00:34:04.180670 systemd[1]: Starting systemd-journal-catalog-update.service... May 17 00:34:04.184000 audit: BPF prog-id=39 op=LOAD May 17 00:34:04.187000 audit: BPF prog-id=40 op=LOAD May 17 00:34:04.186522 systemd[1]: Starting systemd-resolved.service... May 17 00:34:04.189737 systemd[1]: Starting systemd-timesyncd.service... May 17 00:34:04.192920 systemd[1]: Starting systemd-update-utmp.service... May 17 00:34:04.202973 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:34:04.205210 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:34:04.212504 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:34:04.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:04.221000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:04.218508 systemd[1]: Starting modprobe@loop.service... May 17 00:34:04.219310 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:34:04.219549 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:34:04.221238 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:34:04.221428 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:34:04.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:04.225196 systemd[1]: Finished clean-ca-certificates.service. May 17 00:34:04.226235 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:34:04.230000 audit[1685]: SYSTEM_BOOT pid=1685 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 17 00:34:04.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:04.234491 systemd[1]: Finished systemd-update-utmp.service. May 17 00:34:04.238552 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:34:04.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:04.244000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:04.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:04.246000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:04.241089 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:34:04.241965 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:34:04.242152 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:34:04.242335 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:34:04.243858 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:34:04.244734 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:34:04.246165 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:34:04.246345 systemd[1]: Finished modprobe@loop.service. May 17 00:34:04.248368 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:34:04.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:04.252000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:04.252213 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:34:04.252399 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:34:04.253480 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:34:04.258829 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:34:04.260877 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:34:04.264477 systemd[1]: Starting modprobe@drm.service... May 17 00:34:04.267120 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:34:04.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:04.276000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:04.271996 systemd[1]: Starting modprobe@loop.service... May 17 00:34:04.272797 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:34:04.273005 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:34:04.273211 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:34:04.274566 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:34:04.276744 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:34:04.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:04.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:04.291000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:04.290229 systemd[1]: Finished ensure-sysext.service. May 17 00:34:04.291296 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:34:04.291468 systemd[1]: Finished modprobe@loop.service. May 17 00:34:04.292166 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:34:04.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:04.295000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:04.295815 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:34:04.295997 systemd[1]: Finished modprobe@drm.service. May 17 00:34:04.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:04.297000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:04.297940 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:34:04.298108 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:34:04.298843 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:34:04.317000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:04.318032 systemd[1]: Finished systemd-journal-catalog-update.service. May 17 00:34:04.356289 systemd-resolved[1683]: Positive Trust Anchors: May 17 00:34:04.356308 systemd-resolved[1683]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:34:04.356350 systemd-resolved[1683]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:34:04.366045 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:34:04.366074 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:34:04.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:04.373440 systemd[1]: Started systemd-timesyncd.service. May 17 00:34:04.374117 systemd[1]: Reached target time-set.target. May 17 00:34:04.378000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 17 00:34:04.378000 audit[1707]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffeb0aa58e0 a2=420 a3=0 items=0 ppid=1679 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:04.378000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 17 00:34:04.379755 augenrules[1707]: No rules May 17 00:34:04.380304 systemd[1]: Finished audit-rules.service. May 17 00:34:04.399608 systemd-resolved[1683]: Defaulting to hostname 'linux'. May 17 00:34:04.401734 systemd[1]: Started systemd-resolved.service. May 17 00:34:04.402183 systemd[1]: Reached target network.target. May 17 00:34:04.402506 systemd[1]: Reached target nss-lookup.target. May 17 00:34:04.449861 systemd-networkd[1462]: eth0: Gained IPv6LL May 17 00:34:04.451722 systemd[1]: Finished systemd-networkd-wait-online.service. May 17 00:34:04.452160 systemd[1]: Reached target network-online.target. May 17 00:34:05.897931 systemd-resolved[1683]: Clock change detected. Flushing caches. May 17 00:34:05.898074 systemd-timesyncd[1684]: Contacted time server 193.29.63.226:123 (0.flatcar.pool.ntp.org). May 17 00:34:05.898274 systemd-timesyncd[1684]: Initial clock synchronization to Sat 2025-05-17 00:34:05.897779 UTC. May 17 00:34:06.190757 ldconfig[1569]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 17 00:34:06.197903 systemd[1]: Finished ldconfig.service. May 17 00:34:06.199623 systemd[1]: Starting systemd-update-done.service... May 17 00:34:06.207380 systemd[1]: Finished systemd-update-done.service. May 17 00:34:06.207901 systemd[1]: Reached target sysinit.target. May 17 00:34:06.208376 systemd[1]: Started motdgen.path. May 17 00:34:06.208961 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 17 00:34:06.209448 systemd[1]: Started logrotate.timer. May 17 00:34:06.210091 systemd[1]: Started mdadm.timer. May 17 00:34:06.210460 systemd[1]: Started systemd-tmpfiles-clean.timer. May 17 00:34:06.210793 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 17 00:34:06.210826 systemd[1]: Reached target paths.target. May 17 00:34:06.211157 systemd[1]: Reached target timers.target. May 17 00:34:06.211805 systemd[1]: Listening on dbus.socket. May 17 00:34:06.213285 systemd[1]: Starting docker.socket... May 17 00:34:06.217975 systemd[1]: Listening on sshd.socket. May 17 00:34:06.218588 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:34:06.219170 systemd[1]: Listening on docker.socket. May 17 00:34:06.219659 systemd[1]: Reached target sockets.target. May 17 00:34:06.220060 systemd[1]: Reached target basic.target. May 17 00:34:06.220605 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:34:06.220643 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:34:06.221895 systemd[1]: Started amazon-ssm-agent.service. May 17 00:34:06.223933 systemd[1]: Starting containerd.service... May 17 00:34:06.225940 systemd[1]: Starting coreos-metadata-sshkeys@core.service... May 17 00:34:06.229033 systemd[1]: Starting dbus.service... May 17 00:34:06.231420 systemd[1]: Starting enable-oem-cloudinit.service... May 17 00:34:06.234335 systemd[1]: Starting extend-filesystems.service... May 17 00:34:06.234953 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 17 00:34:06.236722 systemd[1]: Starting kubelet.service... May 17 00:34:06.238913 systemd[1]: Starting motdgen.service... May 17 00:34:06.241566 systemd[1]: Started nvidia.service. May 17 00:34:06.253056 systemd[1]: Starting prepare-helm.service... May 17 00:34:06.257386 systemd[1]: Starting ssh-key-proc-cmdline.service... May 17 00:34:06.261424 systemd[1]: Starting sshd-keygen.service... May 17 00:34:06.272213 systemd[1]: Starting systemd-logind.service... May 17 00:34:06.272895 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:34:06.272993 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 17 00:34:06.274049 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 17 00:34:06.277527 systemd[1]: Starting update-engine.service... May 17 00:34:06.279850 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 17 00:34:06.306211 jq[1720]: false May 17 00:34:06.348570 jq[1730]: true May 17 00:34:06.348557 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 17 00:34:06.348831 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 17 00:34:06.350525 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 17 00:34:06.350882 systemd[1]: Finished ssh-key-proc-cmdline.service. May 17 00:34:06.407097 jq[1743]: true May 17 00:34:06.411252 tar[1742]: linux-amd64/helm May 17 00:34:06.453224 systemd[1]: motdgen.service: Deactivated successfully. May 17 00:34:06.453466 systemd[1]: Finished motdgen.service. May 17 00:34:06.498295 dbus-daemon[1719]: [system] SELinux support is enabled May 17 00:34:06.498896 systemd[1]: Started dbus.service. May 17 00:34:06.504159 extend-filesystems[1721]: Found loop1 May 17 00:34:06.504159 extend-filesystems[1721]: Found nvme0n1 May 17 00:34:06.504159 extend-filesystems[1721]: Found nvme0n1p1 May 17 00:34:06.504159 extend-filesystems[1721]: Found nvme0n1p2 May 17 00:34:06.504159 extend-filesystems[1721]: Found nvme0n1p3 May 17 00:34:06.504159 extend-filesystems[1721]: Found usr May 17 00:34:06.504159 extend-filesystems[1721]: Found nvme0n1p4 May 17 00:34:06.504159 extend-filesystems[1721]: Found nvme0n1p6 May 17 00:34:06.504159 extend-filesystems[1721]: Found nvme0n1p7 May 17 00:34:06.504159 extend-filesystems[1721]: Found nvme0n1p9 May 17 00:34:06.504159 extend-filesystems[1721]: Checking size of /dev/nvme0n1p9 May 17 00:34:06.502630 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 17 00:34:06.502664 systemd[1]: Reached target system-config.target. May 17 00:34:06.503381 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 17 00:34:06.503403 systemd[1]: Reached target user-config.target. May 17 00:34:06.548952 dbus-daemon[1719]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1462 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") May 17 00:34:06.554243 systemd[1]: Starting systemd-hostnamed.service... May 17 00:34:06.557303 extend-filesystems[1721]: Resized partition /dev/nvme0n1p9 May 17 00:34:06.562979 amazon-ssm-agent[1716]: 2025/05/17 00:34:06 Failed to load instance info from vault. RegistrationKey does not exist. May 17 00:34:06.565827 extend-filesystems[1784]: resize2fs 1.46.5 (30-Dec-2021) May 17 00:34:06.576356 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks May 17 00:34:06.600496 amazon-ssm-agent[1716]: Initializing new seelog logger May 17 00:34:06.608155 amazon-ssm-agent[1716]: New Seelog Logger Creation Complete May 17 00:34:06.610947 amazon-ssm-agent[1716]: 2025/05/17 00:34:06 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. May 17 00:34:06.661498 amazon-ssm-agent[1716]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. May 17 00:34:06.663529 amazon-ssm-agent[1716]: 2025/05/17 00:34:06 processing appconfig overrides May 17 00:34:06.670724 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 May 17 00:34:06.702863 extend-filesystems[1784]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required May 17 00:34:06.702863 extend-filesystems[1784]: old_desc_blocks = 1, new_desc_blocks = 1 May 17 00:34:06.702863 extend-filesystems[1784]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. May 17 00:34:06.701780 systemd[1]: extend-filesystems.service: Deactivated successfully. May 17 00:34:06.718639 env[1754]: time="2025-05-17T00:34:06.717108430Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 17 00:34:06.719348 extend-filesystems[1721]: Resized filesystem in /dev/nvme0n1p9 May 17 00:34:06.720150 bash[1785]: Updated "/home/core/.ssh/authorized_keys" May 17 00:34:06.701993 systemd[1]: Finished extend-filesystems.service. May 17 00:34:06.714252 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 17 00:34:06.756683 systemd-logind[1728]: Watching system buttons on /dev/input/event1 (Power Button) May 17 00:34:06.757108 systemd-logind[1728]: Watching system buttons on /dev/input/event2 (Sleep Button) May 17 00:34:06.757253 systemd-logind[1728]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 17 00:34:06.757560 systemd-logind[1728]: New seat seat0. May 17 00:34:06.762016 systemd[1]: Started systemd-logind.service. May 17 00:34:06.767682 update_engine[1729]: I0517 00:34:06.766831 1729 main.cc:92] Flatcar Update Engine starting May 17 00:34:06.783267 systemd[1]: Started update-engine.service. May 17 00:34:06.786659 systemd[1]: Started locksmithd.service. May 17 00:34:06.788324 update_engine[1729]: I0517 00:34:06.788187 1729 update_check_scheduler.cc:74] Next update check in 6m20s May 17 00:34:06.841830 systemd[1]: nvidia.service: Deactivated successfully. May 17 00:34:06.876514 env[1754]: time="2025-05-17T00:34:06.876429893Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 17 00:34:06.876718 env[1754]: time="2025-05-17T00:34:06.876652729Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 17 00:34:06.882136 env[1754]: time="2025-05-17T00:34:06.882077589Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.182-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 17 00:34:06.882136 env[1754]: time="2025-05-17T00:34:06.882131949Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 17 00:34:06.882487 env[1754]: time="2025-05-17T00:34:06.882450435Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:34:06.882592 env[1754]: time="2025-05-17T00:34:06.882488608Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 17 00:34:06.882592 env[1754]: time="2025-05-17T00:34:06.882508110Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 17 00:34:06.882592 env[1754]: time="2025-05-17T00:34:06.882525029Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 17 00:34:06.882755 env[1754]: time="2025-05-17T00:34:06.882625195Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 17 00:34:06.882977 env[1754]: time="2025-05-17T00:34:06.882951945Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 17 00:34:06.897664 env[1754]: time="2025-05-17T00:34:06.897537727Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:34:06.897664 env[1754]: time="2025-05-17T00:34:06.897586487Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 17 00:34:06.897881 env[1754]: time="2025-05-17T00:34:06.897718435Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 17 00:34:06.897881 env[1754]: time="2025-05-17T00:34:06.897737938Z" level=info msg="metadata content store policy set" policy=shared May 17 00:34:06.906540 env[1754]: time="2025-05-17T00:34:06.906489150Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 17 00:34:06.906685 env[1754]: time="2025-05-17T00:34:06.906550326Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 17 00:34:06.906685 env[1754]: time="2025-05-17T00:34:06.906569004Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 17 00:34:06.906685 env[1754]: time="2025-05-17T00:34:06.906636476Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 17 00:34:06.906685 env[1754]: time="2025-05-17T00:34:06.906657717Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 17 00:34:06.906879 env[1754]: time="2025-05-17T00:34:06.906747630Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 17 00:34:06.906879 env[1754]: time="2025-05-17T00:34:06.906768209Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 17 00:34:06.906879 env[1754]: time="2025-05-17T00:34:06.906789695Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 17 00:34:06.906879 env[1754]: time="2025-05-17T00:34:06.906810505Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 17 00:34:06.906879 env[1754]: time="2025-05-17T00:34:06.906831300Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 17 00:34:06.906879 env[1754]: time="2025-05-17T00:34:06.906849866Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 17 00:34:06.906879 env[1754]: time="2025-05-17T00:34:06.906869330Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 17 00:34:06.907125 env[1754]: time="2025-05-17T00:34:06.907014444Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 17 00:34:06.907125 env[1754]: time="2025-05-17T00:34:06.907114731Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 17 00:34:06.907601 env[1754]: time="2025-05-17T00:34:06.907573006Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 17 00:34:06.907659 env[1754]: time="2025-05-17T00:34:06.907619526Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 17 00:34:06.907659 env[1754]: time="2025-05-17T00:34:06.907640898Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 17 00:34:06.907766 env[1754]: time="2025-05-17T00:34:06.907738993Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 17 00:34:06.907766 env[1754]: time="2025-05-17T00:34:06.907761297Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 17 00:34:06.907843 env[1754]: time="2025-05-17T00:34:06.907781285Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 17 00:34:06.907843 env[1754]: time="2025-05-17T00:34:06.907800675Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 17 00:34:06.907843 env[1754]: time="2025-05-17T00:34:06.907820360Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 17 00:34:06.907843 env[1754]: time="2025-05-17T00:34:06.907839244Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 17 00:34:06.907987 env[1754]: time="2025-05-17T00:34:06.907857325Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 17 00:34:06.907987 env[1754]: time="2025-05-17T00:34:06.907876677Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 17 00:34:06.907987 env[1754]: time="2025-05-17T00:34:06.907898817Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 17 00:34:06.908113 env[1754]: time="2025-05-17T00:34:06.908058791Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 17 00:34:06.908113 env[1754]: time="2025-05-17T00:34:06.908084276Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 17 00:34:06.908113 env[1754]: time="2025-05-17T00:34:06.908103624Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 17 00:34:06.908224 env[1754]: time="2025-05-17T00:34:06.908121700Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 17 00:34:06.908224 env[1754]: time="2025-05-17T00:34:06.908145134Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 17 00:34:06.908224 env[1754]: time="2025-05-17T00:34:06.908164090Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 17 00:34:06.908224 env[1754]: time="2025-05-17T00:34:06.908190292Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 17 00:34:06.908367 env[1754]: time="2025-05-17T00:34:06.908234225Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 17 00:34:06.908617 env[1754]: time="2025-05-17T00:34:06.908541966Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 17 00:34:06.912290 env[1754]: time="2025-05-17T00:34:06.908631740Z" level=info msg="Connect containerd service" May 17 00:34:06.912290 env[1754]: time="2025-05-17T00:34:06.908680313Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 17 00:34:06.912290 env[1754]: time="2025-05-17T00:34:06.909390739Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:34:06.914259 env[1754]: time="2025-05-17T00:34:06.914215624Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 17 00:34:06.914384 env[1754]: time="2025-05-17T00:34:06.914320333Z" level=info msg=serving... address=/run/containerd/containerd.sock May 17 00:34:06.914441 systemd[1]: Started containerd.service. May 17 00:34:06.916041 env[1754]: time="2025-05-17T00:34:06.916006069Z" level=info msg="containerd successfully booted in 0.286882s" May 17 00:34:06.925382 dbus-daemon[1719]: [system] Successfully activated service 'org.freedesktop.hostname1' May 17 00:34:06.925579 systemd[1]: Started systemd-hostnamed.service. May 17 00:34:06.932085 dbus-daemon[1719]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1783 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") May 17 00:34:06.936454 systemd[1]: Starting polkit.service... May 17 00:34:06.937760 env[1754]: time="2025-05-17T00:34:06.933654100Z" level=info msg="Start subscribing containerd event" May 17 00:34:06.948819 env[1754]: time="2025-05-17T00:34:06.947798282Z" level=info msg="Start recovering state" May 17 00:34:06.948819 env[1754]: time="2025-05-17T00:34:06.947932592Z" level=info msg="Start event monitor" May 17 00:34:06.948819 env[1754]: time="2025-05-17T00:34:06.947976517Z" level=info msg="Start snapshots syncer" May 17 00:34:06.948819 env[1754]: time="2025-05-17T00:34:06.947998271Z" level=info msg="Start cni network conf syncer for default" May 17 00:34:06.948819 env[1754]: time="2025-05-17T00:34:06.948016266Z" level=info msg="Start streaming server" May 17 00:34:06.961099 polkitd[1838]: Started polkitd version 121 May 17 00:34:06.985670 polkitd[1838]: Loading rules from directory /etc/polkit-1/rules.d May 17 00:34:06.985978 polkitd[1838]: Loading rules from directory /usr/share/polkit-1/rules.d May 17 00:34:06.992408 polkitd[1838]: Finished loading, compiling and executing 2 rules May 17 00:34:06.993024 dbus-daemon[1719]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' May 17 00:34:06.993224 systemd[1]: Started polkit.service. May 17 00:34:06.995260 polkitd[1838]: Acquired the name org.freedesktop.PolicyKit1 on the system bus May 17 00:34:07.013119 systemd-hostnamed[1783]: Hostname set to (transient) May 17 00:34:07.013238 systemd-resolved[1683]: System hostname changed to 'ip-172-31-29-247'. May 17 00:34:07.209932 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO Create new startup processor May 17 00:34:07.209932 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO [LongRunningPluginsManager] registered plugins: {} May 17 00:34:07.209932 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO Initializing bookkeeping folders May 17 00:34:07.209932 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO removing the completed state files May 17 00:34:07.209932 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO Initializing bookkeeping folders for long running plugins May 17 00:34:07.209932 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO Initializing replies folder for MDS reply requests that couldn't reach the service May 17 00:34:07.209932 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO Initializing healthcheck folders for long running plugins May 17 00:34:07.209932 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO Initializing locations for inventory plugin May 17 00:34:07.209932 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO Initializing default location for custom inventory May 17 00:34:07.212455 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO Initializing default location for file inventory May 17 00:34:07.212455 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO Initializing default location for role inventory May 17 00:34:07.212455 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO Init the cloudwatchlogs publisher May 17 00:34:07.212455 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO [instanceID=i-00b27a06a45fe28b0] Successfully loaded platform independent plugin aws:softwareInventory May 17 00:34:07.212455 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO [instanceID=i-00b27a06a45fe28b0] Successfully loaded platform independent plugin aws:runPowerShellScript May 17 00:34:07.212455 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO [instanceID=i-00b27a06a45fe28b0] Successfully loaded platform independent plugin aws:configureDocker May 17 00:34:07.212455 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO [instanceID=i-00b27a06a45fe28b0] Successfully loaded platform independent plugin aws:runDockerAction May 17 00:34:07.212455 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO [instanceID=i-00b27a06a45fe28b0] Successfully loaded platform independent plugin aws:runDocument May 17 00:34:07.212455 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO [instanceID=i-00b27a06a45fe28b0] Successfully loaded platform independent plugin aws:updateSsmAgent May 17 00:34:07.212455 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO [instanceID=i-00b27a06a45fe28b0] Successfully loaded platform independent plugin aws:refreshAssociation May 17 00:34:07.212455 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO [instanceID=i-00b27a06a45fe28b0] Successfully loaded platform independent plugin aws:configurePackage May 17 00:34:07.212455 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO [instanceID=i-00b27a06a45fe28b0] Successfully loaded platform independent plugin aws:downloadContent May 17 00:34:07.212455 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO [instanceID=i-00b27a06a45fe28b0] Successfully loaded platform dependent plugin aws:runShellScript May 17 00:34:07.212455 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 May 17 00:34:07.212455 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO OS: linux, Arch: amd64 May 17 00:34:07.230974 amazon-ssm-agent[1716]: datastore file /var/lib/amazon/ssm/i-00b27a06a45fe28b0/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute May 17 00:34:07.238046 coreos-metadata[1718]: May 17 00:34:07.237 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 May 17 00:34:07.241238 coreos-metadata[1718]: May 17 00:34:07.241 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 May 17 00:34:07.242063 coreos-metadata[1718]: May 17 00:34:07.241 INFO Fetch successful May 17 00:34:07.242063 coreos-metadata[1718]: May 17 00:34:07.241 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 May 17 00:34:07.242729 coreos-metadata[1718]: May 17 00:34:07.242 INFO Fetch successful May 17 00:34:07.247024 unknown[1718]: wrote ssh authorized keys file for user: core May 17 00:34:07.289153 update-ssh-keys[1895]: Updated "/home/core/.ssh/authorized_keys" May 17 00:34:07.289543 systemd[1]: Finished coreos-metadata-sshkeys@core.service. May 17 00:34:07.312332 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO [MessagingDeliveryService] Starting document processing engine... May 17 00:34:07.406992 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO [MessagingDeliveryService] [EngineProcessor] Starting May 17 00:34:07.501327 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing May 17 00:34:07.595778 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO [MessagingDeliveryService] Starting message polling May 17 00:34:07.690730 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO [MessagingDeliveryService] Starting send replies to MDS May 17 00:34:07.731731 tar[1742]: linux-amd64/LICENSE May 17 00:34:07.732243 tar[1742]: linux-amd64/README.md May 17 00:34:07.739902 systemd[1]: Finished prepare-helm.service. May 17 00:34:07.785848 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO [instanceID=i-00b27a06a45fe28b0] Starting association polling May 17 00:34:07.881396 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting May 17 00:34:07.907119 locksmithd[1812]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 17 00:34:07.975792 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO [MessagingDeliveryService] [Association] Launching response handler May 17 00:34:08.071342 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing May 17 00:34:08.166973 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service May 17 00:34:08.262871 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized May 17 00:34:08.359034 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO [HealthCheck] HealthCheck reporting agent health. May 17 00:34:08.455305 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO [OfflineService] Starting document processing engine... May 17 00:34:08.551792 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO [OfflineService] [EngineProcessor] Starting May 17 00:34:08.579398 sshd_keygen[1738]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 17 00:34:08.608097 systemd[1]: Finished sshd-keygen.service. May 17 00:34:08.610632 systemd[1]: Starting issuegen.service... May 17 00:34:08.617428 systemd[1]: issuegen.service: Deactivated successfully. May 17 00:34:08.617646 systemd[1]: Finished issuegen.service. May 17 00:34:08.619995 systemd[1]: Starting systemd-user-sessions.service... May 17 00:34:08.629755 systemd[1]: Finished systemd-user-sessions.service. May 17 00:34:08.632096 systemd[1]: Started getty@tty1.service. May 17 00:34:08.634639 systemd[1]: Started serial-getty@ttyS0.service. May 17 00:34:08.635642 systemd[1]: Reached target getty.target. May 17 00:34:08.648782 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO [OfflineService] [EngineProcessor] Initial processing May 17 00:34:08.745684 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO [OfflineService] Starting message polling May 17 00:34:08.842770 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO [OfflineService] Starting send replies to MDS May 17 00:34:08.940159 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO [MessageGatewayService] Starting session document processing engine... May 17 00:34:09.037571 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO [MessageGatewayService] [EngineProcessor] Starting May 17 00:34:09.135244 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. May 17 00:34:09.233197 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-00b27a06a45fe28b0, requestId: 1729593c-974b-4a14-874c-bfd7556d1946 May 17 00:34:09.331218 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO [MessageGatewayService] listening reply. May 17 00:34:09.429541 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO [LongRunningPluginsManager] starting long running plugin manager May 17 00:34:09.528058 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute May 17 00:34:09.626664 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck May 17 00:34:09.725521 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO [StartupProcessor] Executing startup processor tasks May 17 00:34:09.824713 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running May 17 00:34:09.923899 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk May 17 00:34:10.025017 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.7 May 17 00:34:10.124725 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-00b27a06a45fe28b0?role=subscribe&stream=input May 17 00:34:10.224721 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-00b27a06a45fe28b0?role=subscribe&stream=input May 17 00:34:10.324769 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO [MessageGatewayService] Starting receiving message from control channel May 17 00:34:10.425023 amazon-ssm-agent[1716]: 2025-05-17 00:34:07 INFO [MessageGatewayService] [EngineProcessor] Initial processing May 17 00:34:11.063242 systemd[1]: Started kubelet.service. May 17 00:34:11.064195 systemd[1]: Reached target multi-user.target. May 17 00:34:11.066172 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 17 00:34:11.074093 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 17 00:34:11.074262 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 17 00:34:11.075105 systemd[1]: Startup finished in 609ms (kernel) + 7.058s (initrd) + 14.853s (userspace) = 22.521s. May 17 00:34:13.058970 kubelet[1928]: E0517 00:34:13.058900 1928 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:34:13.060538 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:34:13.060676 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:34:13.060909 systemd[1]: kubelet.service: Consumed 1.165s CPU time. May 17 00:34:13.418743 amazon-ssm-agent[1716]: 2025-05-17 00:34:13 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. May 17 00:34:15.293671 systemd[1]: Created slice system-sshd.slice. May 17 00:34:15.295416 systemd[1]: Started sshd@0-172.31.29.247:22-139.178.68.195:55822.service. May 17 00:34:15.521548 sshd[1935]: Accepted publickey for core from 139.178.68.195 port 55822 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:34:15.525538 sshd[1935]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:15.543761 systemd[1]: Created slice user-500.slice. May 17 00:34:15.546139 systemd[1]: Starting user-runtime-dir@500.service... May 17 00:34:15.548630 systemd-logind[1728]: New session 1 of user core. May 17 00:34:15.559390 systemd[1]: Finished user-runtime-dir@500.service. May 17 00:34:15.561402 systemd[1]: Starting user@500.service... May 17 00:34:15.566664 (systemd)[1938]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:15.670986 systemd[1938]: Queued start job for default target default.target. May 17 00:34:15.671640 systemd[1938]: Reached target paths.target. May 17 00:34:15.671673 systemd[1938]: Reached target sockets.target. May 17 00:34:15.671691 systemd[1938]: Reached target timers.target. May 17 00:34:15.671738 systemd[1938]: Reached target basic.target. May 17 00:34:15.671864 systemd[1]: Started user@500.service. May 17 00:34:15.673358 systemd[1]: Started session-1.scope. May 17 00:34:15.674063 systemd[1938]: Reached target default.target. May 17 00:34:15.674288 systemd[1938]: Startup finished in 99ms. May 17 00:34:15.819064 systemd[1]: Started sshd@1-172.31.29.247:22-139.178.68.195:55824.service. May 17 00:34:15.983195 sshd[1947]: Accepted publickey for core from 139.178.68.195 port 55824 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:34:15.985149 sshd[1947]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:15.989773 systemd-logind[1728]: New session 2 of user core. May 17 00:34:15.990925 systemd[1]: Started session-2.scope. May 17 00:34:16.121453 sshd[1947]: pam_unix(sshd:session): session closed for user core May 17 00:34:16.125109 systemd[1]: sshd@1-172.31.29.247:22-139.178.68.195:55824.service: Deactivated successfully. May 17 00:34:16.126046 systemd[1]: session-2.scope: Deactivated successfully. May 17 00:34:16.126990 systemd-logind[1728]: Session 2 logged out. Waiting for processes to exit. May 17 00:34:16.127923 systemd-logind[1728]: Removed session 2. May 17 00:34:16.148878 systemd[1]: Started sshd@2-172.31.29.247:22-139.178.68.195:55836.service. May 17 00:34:16.311788 sshd[1953]: Accepted publickey for core from 139.178.68.195 port 55836 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:34:16.313443 sshd[1953]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:16.318417 systemd-logind[1728]: New session 3 of user core. May 17 00:34:16.319062 systemd[1]: Started session-3.scope. May 17 00:34:16.445847 sshd[1953]: pam_unix(sshd:session): session closed for user core May 17 00:34:16.449393 systemd[1]: sshd@2-172.31.29.247:22-139.178.68.195:55836.service: Deactivated successfully. May 17 00:34:16.450143 systemd[1]: session-3.scope: Deactivated successfully. May 17 00:34:16.450883 systemd-logind[1728]: Session 3 logged out. Waiting for processes to exit. May 17 00:34:16.451583 systemd-logind[1728]: Removed session 3. May 17 00:34:16.472967 systemd[1]: Started sshd@3-172.31.29.247:22-139.178.68.195:55838.service. May 17 00:34:16.627497 sshd[1959]: Accepted publickey for core from 139.178.68.195 port 55838 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:34:16.629127 sshd[1959]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:16.634514 systemd[1]: Started session-4.scope. May 17 00:34:16.635207 systemd-logind[1728]: New session 4 of user core. May 17 00:34:16.761210 sshd[1959]: pam_unix(sshd:session): session closed for user core May 17 00:34:16.764130 systemd[1]: sshd@3-172.31.29.247:22-139.178.68.195:55838.service: Deactivated successfully. May 17 00:34:16.765159 systemd[1]: session-4.scope: Deactivated successfully. May 17 00:34:16.765954 systemd-logind[1728]: Session 4 logged out. Waiting for processes to exit. May 17 00:34:16.767187 systemd-logind[1728]: Removed session 4. May 17 00:34:16.787195 systemd[1]: Started sshd@4-172.31.29.247:22-139.178.68.195:55842.service. May 17 00:34:16.947190 sshd[1965]: Accepted publickey for core from 139.178.68.195 port 55842 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:34:16.948843 sshd[1965]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:16.954424 systemd[1]: Started session-5.scope. May 17 00:34:16.955113 systemd-logind[1728]: New session 5 of user core. May 17 00:34:17.122292 sudo[1968]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 17 00:34:17.122544 sudo[1968]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:34:17.131964 dbus-daemon[1719]: \xd0-\xad6\xabU: received setenforce notice (enforcing=-644456400) May 17 00:34:17.133943 sudo[1968]: pam_unix(sudo:session): session closed for user root May 17 00:34:17.158910 sshd[1965]: pam_unix(sshd:session): session closed for user core May 17 00:34:17.162072 systemd[1]: sshd@4-172.31.29.247:22-139.178.68.195:55842.service: Deactivated successfully. May 17 00:34:17.162850 systemd[1]: session-5.scope: Deactivated successfully. May 17 00:34:17.163470 systemd-logind[1728]: Session 5 logged out. Waiting for processes to exit. May 17 00:34:17.164799 systemd-logind[1728]: Removed session 5. May 17 00:34:17.185204 systemd[1]: Started sshd@5-172.31.29.247:22-139.178.68.195:55850.service. May 17 00:34:17.343240 sshd[1972]: Accepted publickey for core from 139.178.68.195 port 55850 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:34:17.345070 sshd[1972]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:17.350942 systemd-logind[1728]: New session 6 of user core. May 17 00:34:17.351555 systemd[1]: Started session-6.scope. May 17 00:34:17.456396 sudo[1976]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 17 00:34:17.456848 sudo[1976]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:34:17.460786 sudo[1976]: pam_unix(sudo:session): session closed for user root May 17 00:34:17.466488 sudo[1975]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 17 00:34:17.466869 sudo[1975]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:34:17.478155 systemd[1]: Stopping audit-rules.service... May 17 00:34:17.478000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:34:17.480899 kernel: kauditd_printk_skb: 235 callbacks suppressed May 17 00:34:17.480948 kernel: audit: type=1305 audit(1747442057.478:216): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:34:17.478000 audit[1979]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd666b65d0 a2=420 a3=0 items=0 ppid=1 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:17.483139 auditctl[1979]: No rules May 17 00:34:17.487676 kernel: audit: type=1300 audit(1747442057.478:216): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd666b65d0 a2=420 a3=0 items=0 ppid=1 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:17.483688 systemd[1]: audit-rules.service: Deactivated successfully. May 17 00:34:17.483925 systemd[1]: Stopped audit-rules.service. May 17 00:34:17.488729 systemd[1]: Starting audit-rules.service... May 17 00:34:17.478000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 17 00:34:17.491784 kernel: audit: type=1327 audit(1747442057.478:216): proctitle=2F7362696E2F617564697463746C002D44 May 17 00:34:17.482000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:17.495755 kernel: audit: type=1131 audit(1747442057.482:217): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:17.510499 augenrules[1996]: No rules May 17 00:34:17.511415 systemd[1]: Finished audit-rules.service. May 17 00:34:17.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:17.512959 sudo[1975]: pam_unix(sudo:session): session closed for user root May 17 00:34:17.515745 kernel: audit: type=1130 audit(1747442057.509:218): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:17.515796 kernel: audit: type=1106 audit(1747442057.511:219): pid=1975 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:34:17.511000 audit[1975]: USER_END pid=1975 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:34:17.519730 kernel: audit: type=1104 audit(1747442057.511:220): pid=1975 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:34:17.511000 audit[1975]: CRED_DISP pid=1975 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:34:17.536859 sshd[1972]: pam_unix(sshd:session): session closed for user core May 17 00:34:17.536000 audit[1972]: USER_END pid=1972 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:34:17.540414 systemd[1]: sshd@5-172.31.29.247:22-139.178.68.195:55850.service: Deactivated successfully. May 17 00:34:17.541153 systemd[1]: session-6.scope: Deactivated successfully. May 17 00:34:17.542991 systemd-logind[1728]: Session 6 logged out. Waiting for processes to exit. May 17 00:34:17.536000 audit[1972]: CRED_DISP pid=1972 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:34:17.544613 systemd-logind[1728]: Removed session 6. May 17 00:34:17.547466 kernel: audit: type=1106 audit(1747442057.536:221): pid=1972 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:34:17.547548 kernel: audit: type=1104 audit(1747442057.536:222): pid=1972 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:34:17.547600 kernel: audit: type=1131 audit(1747442057.536:223): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.29.247:22-139.178.68.195:55850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:17.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.29.247:22-139.178.68.195:55850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:17.563853 systemd[1]: Started sshd@6-172.31.29.247:22-139.178.68.195:55856.service. May 17 00:34:17.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.29.247:22-139.178.68.195:55856 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:17.729000 audit[2002]: USER_ACCT pid=2002 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:34:17.731000 audit[2002]: CRED_ACQ pid=2002 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:34:17.731000 audit[2002]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc52da1760 a2=3 a3=0 items=0 ppid=1 pid=2002 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:17.731000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:34:17.733918 sshd[2002]: Accepted publickey for core from 139.178.68.195 port 55856 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:34:17.733653 sshd[2002]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:17.739611 systemd[1]: Started session-7.scope. May 17 00:34:17.740132 systemd-logind[1728]: New session 7 of user core. May 17 00:34:17.744000 audit[2002]: USER_START pid=2002 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:34:17.746000 audit[2004]: CRED_ACQ pid=2004 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:34:17.844000 audit[2005]: USER_ACCT pid=2005 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:34:17.844000 audit[2005]: CRED_REFR pid=2005 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:34:17.846006 sudo[2005]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 17 00:34:17.846239 sudo[2005]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:34:17.846000 audit[2005]: USER_START pid=2005 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:34:17.874747 systemd[1]: Starting docker.service... May 17 00:34:17.919098 env[2015]: time="2025-05-17T00:34:17.919057080Z" level=info msg="Starting up" May 17 00:34:17.921024 env[2015]: time="2025-05-17T00:34:17.920983288Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 17 00:34:17.921024 env[2015]: time="2025-05-17T00:34:17.921010582Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 17 00:34:17.921191 env[2015]: time="2025-05-17T00:34:17.921038654Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 17 00:34:17.921191 env[2015]: time="2025-05-17T00:34:17.921052969Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 17 00:34:17.926846 env[2015]: time="2025-05-17T00:34:17.926793922Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 17 00:34:17.926846 env[2015]: time="2025-05-17T00:34:17.926823987Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 17 00:34:17.926846 env[2015]: time="2025-05-17T00:34:17.926849186Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 17 00:34:17.927057 env[2015]: time="2025-05-17T00:34:17.926864709Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 17 00:34:17.934231 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport1163540192-merged.mount: Deactivated successfully. May 17 00:34:17.971120 env[2015]: time="2025-05-17T00:34:17.970689270Z" level=info msg="Loading containers: start." May 17 00:34:18.111000 audit[2045]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=2045 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:18.111000 audit[2045]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffdad20b250 a2=0 a3=7ffdad20b23c items=0 ppid=2015 pid=2045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:18.111000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 17 00:34:18.114000 audit[2047]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2047 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:18.114000 audit[2047]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffce2da2540 a2=0 a3=7ffce2da252c items=0 ppid=2015 pid=2047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:18.114000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 17 00:34:18.117000 audit[2049]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=2049 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:18.117000 audit[2049]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffee86ad910 a2=0 a3=7ffee86ad8fc items=0 ppid=2015 pid=2049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:18.117000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 17 00:34:18.119000 audit[2051]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=2051 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:18.119000 audit[2051]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc0f811320 a2=0 a3=7ffc0f81130c items=0 ppid=2015 pid=2051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:18.119000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 17 00:34:18.123000 audit[2053]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2053 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:18.123000 audit[2053]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc44bfd950 a2=0 a3=7ffc44bfd93c items=0 ppid=2015 pid=2053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:18.123000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 17 00:34:18.145000 audit[2058]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=2058 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:18.145000 audit[2058]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffde3dc41a0 a2=0 a3=7ffde3dc418c items=0 ppid=2015 pid=2058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:18.145000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 17 00:34:18.156000 audit[2060]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=2060 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:18.156000 audit[2060]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffeb37ed1c0 a2=0 a3=7ffeb37ed1ac items=0 ppid=2015 pid=2060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:18.156000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 17 00:34:18.159000 audit[2062]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=2062 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:18.159000 audit[2062]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffdff181260 a2=0 a3=7ffdff18124c items=0 ppid=2015 pid=2062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:18.159000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 17 00:34:18.161000 audit[2064]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=2064 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:18.161000 audit[2064]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7fff41d7c1f0 a2=0 a3=7fff41d7c1dc items=0 ppid=2015 pid=2064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:18.161000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:34:18.185000 audit[2068]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=2068 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:18.185000 audit[2068]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd4a963fc0 a2=0 a3=7ffd4a963fac items=0 ppid=2015 pid=2068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:18.185000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 17 00:34:18.191000 audit[2069]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=2069 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:18.191000 audit[2069]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe4d9f14b0 a2=0 a3=7ffe4d9f149c items=0 ppid=2015 pid=2069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:18.191000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:34:18.215727 kernel: Initializing XFRM netlink socket May 17 00:34:18.290785 env[2015]: time="2025-05-17T00:34:18.290745525Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 17 00:34:18.291890 (udev-worker)[2025]: Network interface NamePolicy= disabled on kernel command line. May 17 00:34:18.319000 audit[2077]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=2077 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:18.319000 audit[2077]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffe0a87c990 a2=0 a3=7ffe0a87c97c items=0 ppid=2015 pid=2077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:18.319000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 17 00:34:18.329000 audit[2080]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=2080 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:18.329000 audit[2080]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fff75cf5d20 a2=0 a3=7fff75cf5d0c items=0 ppid=2015 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:18.329000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 17 00:34:18.332000 audit[2083]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=2083 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:18.332000 audit[2083]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fffd0282e50 a2=0 a3=7fffd0282e3c items=0 ppid=2015 pid=2083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:18.332000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 17 00:34:18.334000 audit[2085]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=2085 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:18.334000 audit[2085]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff87791850 a2=0 a3=7fff8779183c items=0 ppid=2015 pid=2085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:18.334000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 17 00:34:18.336000 audit[2087]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=2087 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:18.336000 audit[2087]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffe93a55a90 a2=0 a3=7ffe93a55a7c items=0 ppid=2015 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:18.336000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 17 00:34:18.339000 audit[2089]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=2089 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:18.339000 audit[2089]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fffa4d559f0 a2=0 a3=7fffa4d559dc items=0 ppid=2015 pid=2089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:18.339000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 17 00:34:18.341000 audit[2091]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=2091 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:18.341000 audit[2091]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fffdfbae770 a2=0 a3=7fffdfbae75c items=0 ppid=2015 pid=2091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:18.341000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 17 00:34:18.370000 audit[2094]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=2094 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:18.370000 audit[2094]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffdc61b41b0 a2=0 a3=7ffdc61b419c items=0 ppid=2015 pid=2094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:18.370000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 17 00:34:18.374000 audit[2096]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2096 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:18.374000 audit[2096]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffdd4497c00 a2=0 a3=7ffdd4497bec items=0 ppid=2015 pid=2096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:18.374000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 17 00:34:18.376000 audit[2098]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=2098 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:18.376000 audit[2098]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffe77428830 a2=0 a3=7ffe7742881c items=0 ppid=2015 pid=2098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:18.376000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 17 00:34:18.378000 audit[2100]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=2100 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:18.378000 audit[2100]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe0ff36ae0 a2=0 a3=7ffe0ff36acc items=0 ppid=2015 pid=2100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:18.378000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 17 00:34:18.381525 systemd-networkd[1462]: docker0: Link UP May 17 00:34:18.389000 audit[2104]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=2104 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:18.389000 audit[2104]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc53436b30 a2=0 a3=7ffc53436b1c items=0 ppid=2015 pid=2104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:18.389000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 17 00:34:18.394000 audit[2105]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=2105 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:18.394000 audit[2105]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffca82d8400 a2=0 a3=7ffca82d83ec items=0 ppid=2015 pid=2105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:18.394000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:34:18.396607 env[2015]: time="2025-05-17T00:34:18.396519482Z" level=info msg="Loading containers: done." May 17 00:34:18.410925 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck3543190728-merged.mount: Deactivated successfully. May 17 00:34:18.426838 env[2015]: time="2025-05-17T00:34:18.426776836Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 17 00:34:18.427077 env[2015]: time="2025-05-17T00:34:18.427003914Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 17 00:34:18.427176 env[2015]: time="2025-05-17T00:34:18.427149199Z" level=info msg="Daemon has completed initialization" May 17 00:34:18.446361 systemd[1]: Started docker.service. May 17 00:34:18.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:18.454862 env[2015]: time="2025-05-17T00:34:18.454775713Z" level=info msg="API listen on /run/docker.sock" May 17 00:34:20.089460 env[1754]: time="2025-05-17T00:34:20.089405579Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.9\"" May 17 00:34:20.709052 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4055456148.mount: Deactivated successfully. May 17 00:34:23.142813 env[1754]: time="2025-05-17T00:34:23.142744106Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:23.145884 env[1754]: time="2025-05-17T00:34:23.145825095Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0c19e0eafbdfffa1317cf99a16478265a4cd746ef677de27b0be6a8b515f36b1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:23.147968 env[1754]: time="2025-05-17T00:34:23.147917482Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:23.150289 env[1754]: time="2025-05-17T00:34:23.150247635Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:5b68f0df22013422dc8fb9ddfcff513eb6fc92f9dbf8aae41555c895efef5a20,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:23.151006 env[1754]: time="2025-05-17T00:34:23.150965549Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.9\" returns image reference \"sha256:0c19e0eafbdfffa1317cf99a16478265a4cd746ef677de27b0be6a8b515f36b1\"" May 17 00:34:23.151688 env[1754]: time="2025-05-17T00:34:23.151658680Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.9\"" May 17 00:34:23.311519 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 17 00:34:23.320317 kernel: kauditd_printk_skb: 84 callbacks suppressed May 17 00:34:23.320367 kernel: audit: type=1130 audit(1747442063.310:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:23.320398 kernel: audit: type=1131 audit(1747442063.310:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:23.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:23.310000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:23.311802 systemd[1]: Stopped kubelet.service. May 17 00:34:23.311874 systemd[1]: kubelet.service: Consumed 1.165s CPU time. May 17 00:34:23.314028 systemd[1]: Starting kubelet.service... May 17 00:34:23.537784 kernel: audit: type=1130 audit(1747442063.531:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:23.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:23.532991 systemd[1]: Started kubelet.service. May 17 00:34:23.594883 kubelet[2142]: E0517 00:34:23.594833 2142 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:34:23.598209 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:34:23.598382 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:34:23.596000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:34:23.602760 kernel: audit: type=1131 audit(1747442063.596:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:34:25.455491 env[1754]: time="2025-05-17T00:34:25.455434249Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:25.458309 env[1754]: time="2025-05-17T00:34:25.458259692Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6aa3d581404ae6ae5dc355cb750aaedec843d2c99263d28fce50277e8e2a6ec2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:25.460597 env[1754]: time="2025-05-17T00:34:25.460549599Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:25.462599 env[1754]: time="2025-05-17T00:34:25.462549633Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:be9e7987d323b38a12e28436cff6d6ec6fc31ffdd3ea11eaa9d74852e9d31248,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:25.463606 env[1754]: time="2025-05-17T00:34:25.463559506Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.9\" returns image reference \"sha256:6aa3d581404ae6ae5dc355cb750aaedec843d2c99263d28fce50277e8e2a6ec2\"" May 17 00:34:25.464545 env[1754]: time="2025-05-17T00:34:25.464513876Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.9\"" May 17 00:34:27.021754 env[1754]: time="2025-05-17T00:34:27.021692506Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:27.024510 env[1754]: time="2025-05-17T00:34:27.024467344Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:737ed3eafaf27a28ea9e13b736011bfed5bd349785ac6bc220b34eaf4adc51e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:27.026423 env[1754]: time="2025-05-17T00:34:27.026380920Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:27.028671 env[1754]: time="2025-05-17T00:34:27.028625087Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:eb358c7346bb17ab2c639c3ff8ab76a147dec7ae609f5c0c2800233e42253ed1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:27.029739 env[1754]: time="2025-05-17T00:34:27.029684201Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.9\" returns image reference \"sha256:737ed3eafaf27a28ea9e13b736011bfed5bd349785ac6bc220b34eaf4adc51e3\"" May 17 00:34:27.030633 env[1754]: time="2025-05-17T00:34:27.030603840Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.9\"" May 17 00:34:28.193025 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2626217433.mount: Deactivated successfully. May 17 00:34:28.882721 env[1754]: time="2025-05-17T00:34:28.882658397Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:28.884895 env[1754]: time="2025-05-17T00:34:28.884773339Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:11a47a71ed3ecf643e15a11990daed3b656279449ba9344db0b54652c4723578,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:28.891917 env[1754]: time="2025-05-17T00:34:28.891865042Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:28.894153 env[1754]: time="2025-05-17T00:34:28.894108404Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:fdf026cf2434537e499e9c739d189ca8fc57101d929ac5ccd8e24f979a9738c1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:28.897038 env[1754]: time="2025-05-17T00:34:28.896990230Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.9\" returns image reference \"sha256:11a47a71ed3ecf643e15a11990daed3b656279449ba9344db0b54652c4723578\"" May 17 00:34:28.903499 env[1754]: time="2025-05-17T00:34:28.903451444Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\"" May 17 00:34:29.487089 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2770746466.mount: Deactivated successfully. May 17 00:34:30.559050 env[1754]: time="2025-05-17T00:34:30.558994360Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:30.561283 env[1754]: time="2025-05-17T00:34:30.561241738Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:30.563057 env[1754]: time="2025-05-17T00:34:30.563023581Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:30.565349 env[1754]: time="2025-05-17T00:34:30.565315269Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:9caabbf6238b189a65d0d6e6ac138de60d6a1c419e5a341fbbb7c78382559c6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:30.566081 env[1754]: time="2025-05-17T00:34:30.566047001Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\" returns image reference \"sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6\"" May 17 00:34:30.566621 env[1754]: time="2025-05-17T00:34:30.566600880Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 17 00:34:31.061458 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4169220535.mount: Deactivated successfully. May 17 00:34:31.066522 env[1754]: time="2025-05-17T00:34:31.066397901Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:31.069191 env[1754]: time="2025-05-17T00:34:31.069149539Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:31.071479 env[1754]: time="2025-05-17T00:34:31.071429664Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:31.073318 env[1754]: time="2025-05-17T00:34:31.073240147Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:31.074018 env[1754]: time="2025-05-17T00:34:31.073974853Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" May 17 00:34:31.074777 env[1754]: time="2025-05-17T00:34:31.074749040Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\"" May 17 00:34:31.616189 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount801038153.mount: Deactivated successfully. May 17 00:34:33.858777 kernel: audit: type=1130 audit(1747442073.848:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:33.858946 kernel: audit: type=1131 audit(1747442073.848:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:33.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:33.848000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:33.849517 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 17 00:34:33.849818 systemd[1]: Stopped kubelet.service. May 17 00:34:33.855243 systemd[1]: Starting kubelet.service... May 17 00:34:34.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:34.497042 systemd[1]: Started kubelet.service. May 17 00:34:34.501733 kernel: audit: type=1130 audit(1747442074.495:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:34.524929 env[1754]: time="2025-05-17T00:34:34.523118356Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:34.526358 env[1754]: time="2025-05-17T00:34:34.526303859Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:34.529192 env[1754]: time="2025-05-17T00:34:34.529154088Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:34.533580 env[1754]: time="2025-05-17T00:34:34.533516575Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:34.534485 env[1754]: time="2025-05-17T00:34:34.534444975Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\" returns image reference \"sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4\"" May 17 00:34:34.588256 kubelet[2153]: E0517 00:34:34.588212 2153 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:34:34.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:34:34.590835 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:34:34.591016 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:34:34.594740 kernel: audit: type=1131 audit(1747442074.589:265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:34:37.018522 systemd[1]: systemd-hostnamed.service: Deactivated successfully. May 17 00:34:37.024006 kernel: audit: type=1131 audit(1747442077.017:266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:37.017000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:37.045484 kernel: audit: type=1334 audit(1747442077.037:267): prog-id=46 op=UNLOAD May 17 00:34:37.045624 kernel: audit: type=1334 audit(1747442077.037:268): prog-id=45 op=UNLOAD May 17 00:34:37.045659 kernel: audit: type=1334 audit(1747442077.037:269): prog-id=44 op=UNLOAD May 17 00:34:37.037000 audit: BPF prog-id=46 op=UNLOAD May 17 00:34:37.037000 audit: BPF prog-id=45 op=UNLOAD May 17 00:34:37.037000 audit: BPF prog-id=44 op=UNLOAD May 17 00:34:37.604124 systemd[1]: Stopped kubelet.service. May 17 00:34:37.602000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:37.607775 systemd[1]: Starting kubelet.service... May 17 00:34:37.611724 kernel: audit: type=1130 audit(1747442077.602:270): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:37.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:37.620745 kernel: audit: type=1131 audit(1747442077.602:271): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:37.653880 systemd[1]: Reloading. May 17 00:34:37.766980 /usr/lib/systemd/system-generators/torcx-generator[2204]: time="2025-05-17T00:34:37Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:34:37.767318 /usr/lib/systemd/system-generators/torcx-generator[2204]: time="2025-05-17T00:34:37Z" level=info msg="torcx already run" May 17 00:34:37.899408 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:34:37.899432 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:34:37.924938 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:34:38.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.019000 audit: BPF prog-id=49 op=LOAD May 17 00:34:38.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.019000 audit: BPF prog-id=50 op=LOAD May 17 00:34:38.019000 audit: BPF prog-id=30 op=UNLOAD May 17 00:34:38.019000 audit: BPF prog-id=31 op=UNLOAD May 17 00:34:38.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.020000 audit: BPF prog-id=51 op=LOAD May 17 00:34:38.020000 audit: BPF prog-id=47 op=UNLOAD May 17 00:34:38.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.023000 audit: BPF prog-id=52 op=LOAD May 17 00:34:38.023000 audit: BPF prog-id=39 op=UNLOAD May 17 00:34:38.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.025000 audit: BPF prog-id=53 op=LOAD May 17 00:34:38.026000 audit: BPF prog-id=32 op=UNLOAD May 17 00:34:38.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.027000 audit: BPF prog-id=54 op=LOAD May 17 00:34:38.027000 audit: BPF prog-id=33 op=UNLOAD May 17 00:34:38.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.027000 audit: BPF prog-id=55 op=LOAD May 17 00:34:38.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.027000 audit: BPF prog-id=56 op=LOAD May 17 00:34:38.027000 audit: BPF prog-id=34 op=UNLOAD May 17 00:34:38.027000 audit: BPF prog-id=35 op=UNLOAD May 17 00:34:38.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.030000 audit: BPF prog-id=57 op=LOAD May 17 00:34:38.030000 audit: BPF prog-id=41 op=UNLOAD May 17 00:34:38.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.030000 audit: BPF prog-id=58 op=LOAD May 17 00:34:38.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.030000 audit: BPF prog-id=59 op=LOAD May 17 00:34:38.030000 audit: BPF prog-id=42 op=UNLOAD May 17 00:34:38.030000 audit: BPF prog-id=43 op=UNLOAD May 17 00:34:38.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.032000 audit: BPF prog-id=60 op=LOAD May 17 00:34:38.032000 audit: BPF prog-id=36 op=UNLOAD May 17 00:34:38.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.032000 audit: BPF prog-id=61 op=LOAD May 17 00:34:38.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.032000 audit: BPF prog-id=62 op=LOAD May 17 00:34:38.032000 audit: BPF prog-id=37 op=UNLOAD May 17 00:34:38.032000 audit: BPF prog-id=38 op=UNLOAD May 17 00:34:38.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:38.033000 audit: BPF prog-id=63 op=LOAD May 17 00:34:38.033000 audit: BPF prog-id=40 op=UNLOAD May 17 00:34:38.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:34:38.057301 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM May 17 00:34:38.057379 systemd[1]: kubelet.service: Failed with result 'signal'. May 17 00:34:38.057619 systemd[1]: Stopped kubelet.service. May 17 00:34:38.060796 systemd[1]: Starting kubelet.service... May 17 00:34:38.507562 systemd[1]: Started kubelet.service. May 17 00:34:38.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:38.561107 kubelet[2264]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:34:38.561107 kubelet[2264]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 17 00:34:38.561107 kubelet[2264]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:34:38.561107 kubelet[2264]: I0517 00:34:38.560410 2264 server.go:211] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 17 00:34:38.972273 kubelet[2264]: I0517 00:34:38.972228 2264 server.go:491] "Kubelet version" kubeletVersion="v1.31.8" May 17 00:34:38.972273 kubelet[2264]: I0517 00:34:38.972271 2264 server.go:493] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 17 00:34:38.972872 kubelet[2264]: I0517 00:34:38.972841 2264 server.go:934] "Client rotation is on, will bootstrap in background" May 17 00:34:39.021080 kubelet[2264]: E0517 00:34:39.021050 2264 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://172.31.29.247:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 172.31.29.247:6443: connect: connection refused" logger="UnhandledError" May 17 00:34:39.033114 kubelet[2264]: I0517 00:34:39.032978 2264 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 00:34:39.047220 kubelet[2264]: E0517 00:34:39.047184 2264 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 17 00:34:39.047418 kubelet[2264]: I0517 00:34:39.047393 2264 server.go:1408] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 17 00:34:39.052216 kubelet[2264]: I0517 00:34:39.052184 2264 server.go:749] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 17 00:34:39.052341 kubelet[2264]: I0517 00:34:39.052273 2264 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 17 00:34:39.052431 kubelet[2264]: I0517 00:34:39.052390 2264 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 17 00:34:39.052602 kubelet[2264]: I0517 00:34:39.052425 2264 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ip-172-31-29-247","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 17 00:34:39.052722 kubelet[2264]: I0517 00:34:39.052607 2264 topology_manager.go:138] "Creating topology manager with none policy" May 17 00:34:39.052722 kubelet[2264]: I0517 00:34:39.052617 2264 container_manager_linux.go:300] "Creating device plugin manager" May 17 00:34:39.052775 kubelet[2264]: I0517 00:34:39.052734 2264 state_mem.go:36] "Initialized new in-memory state store" May 17 00:34:39.067139 kubelet[2264]: I0517 00:34:39.067092 2264 kubelet.go:408] "Attempting to sync node with API server" May 17 00:34:39.067139 kubelet[2264]: I0517 00:34:39.067145 2264 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 17 00:34:39.067323 kubelet[2264]: I0517 00:34:39.067188 2264 kubelet.go:314] "Adding apiserver pod source" May 17 00:34:39.067323 kubelet[2264]: I0517 00:34:39.067211 2264 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 17 00:34:39.085694 kubelet[2264]: W0517 00:34:39.085631 2264 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.31.29.247:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-29-247&limit=500&resourceVersion=0": dial tcp 172.31.29.247:6443: connect: connection refused May 17 00:34:39.085862 kubelet[2264]: E0517 00:34:39.085736 2264 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://172.31.29.247:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-29-247&limit=500&resourceVersion=0\": dial tcp 172.31.29.247:6443: connect: connection refused" logger="UnhandledError" May 17 00:34:39.085862 kubelet[2264]: I0517 00:34:39.085842 2264 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 17 00:34:39.086308 kubelet[2264]: I0517 00:34:39.086279 2264 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 17 00:34:39.088639 kubelet[2264]: W0517 00:34:39.088582 2264 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 17 00:34:39.096216 kubelet[2264]: W0517 00:34:39.096171 2264 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.31.29.247:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 172.31.29.247:6443: connect: connection refused May 17 00:34:39.096380 kubelet[2264]: E0517 00:34:39.096362 2264 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://172.31.29.247:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 172.31.29.247:6443: connect: connection refused" logger="UnhandledError" May 17 00:34:39.097157 kubelet[2264]: I0517 00:34:39.097118 2264 server.go:1274] "Started kubelet" May 17 00:34:39.110859 kernel: kauditd_printk_skb: 174 callbacks suppressed May 17 00:34:39.110995 kernel: audit: type=1400 audit(1747442079.103:446): avc: denied { mac_admin } for pid=2264 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:39.103000 audit[2264]: AVC avc: denied { mac_admin } for pid=2264 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:39.111085 kubelet[2264]: I0517 00:34:39.104930 2264 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 17 00:34:39.111085 kubelet[2264]: I0517 00:34:39.104965 2264 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 17 00:34:39.111085 kubelet[2264]: I0517 00:34:39.105027 2264 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 17 00:34:39.103000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:34:39.114835 kernel: audit: type=1401 audit(1747442079.103:446): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:34:39.114921 kernel: audit: type=1300 audit(1747442079.103:446): arch=c000003e syscall=188 success=no exit=-22 a0=c0005715c0 a1=c000a327c8 a2=c000571590 a3=25 items=0 ppid=1 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:39.103000 audit[2264]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0005715c0 a1=c000a327c8 a2=c000571590 a3=25 items=0 ppid=1 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:39.115115 kubelet[2264]: I0517 00:34:39.115082 2264 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 17 00:34:39.116654 kubelet[2264]: I0517 00:34:39.116613 2264 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 17 00:34:39.117051 kubelet[2264]: I0517 00:34:39.117037 2264 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 17 00:34:39.117765 kubelet[2264]: I0517 00:34:39.117744 2264 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 17 00:34:39.120144 kubelet[2264]: I0517 00:34:39.120123 2264 volume_manager.go:289] "Starting Kubelet Volume Manager" May 17 00:34:39.122423 kernel: audit: type=1327 audit(1747442079.103:446): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:34:39.103000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:34:39.122778 kubelet[2264]: E0517 00:34:39.121059 2264 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://172.31.29.247:6443/api/v1/namespaces/default/events\": dial tcp 172.31.29.247:6443: connect: connection refused" event="&Event{ObjectMeta:{ip-172-31-29-247.184029500626cc4a default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ip-172-31-29-247,UID:ip-172-31-29-247,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ip-172-31-29-247,},FirstTimestamp:2025-05-17 00:34:39.097080906 +0000 UTC m=+0.581990889,LastTimestamp:2025-05-17 00:34:39.097080906 +0000 UTC m=+0.581990889,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ip-172-31-29-247,}" May 17 00:34:39.123552 kubelet[2264]: E0517 00:34:39.123531 2264 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-29-247\" not found" May 17 00:34:39.125669 kubelet[2264]: I0517 00:34:39.125652 2264 desired_state_of_world_populator.go:147] "Desired state populator starts to run" May 17 00:34:39.125804 kubelet[2264]: I0517 00:34:39.120976 2264 server.go:449] "Adding debug handlers to kubelet server" May 17 00:34:39.103000 audit[2264]: AVC avc: denied { mac_admin } for pid=2264 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:39.135255 kubelet[2264]: I0517 00:34:39.130317 2264 reconciler.go:26] "Reconciler: start to sync state" May 17 00:34:39.135255 kubelet[2264]: I0517 00:34:39.130957 2264 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 17 00:34:39.135255 kubelet[2264]: E0517 00:34:39.131421 2264 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.29.247:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-29-247?timeout=10s\": dial tcp 172.31.29.247:6443: connect: connection refused" interval="200ms" May 17 00:34:39.135255 kubelet[2264]: I0517 00:34:39.133088 2264 factory.go:221] Registration of the containerd container factory successfully May 17 00:34:39.135255 kubelet[2264]: I0517 00:34:39.133099 2264 factory.go:221] Registration of the systemd container factory successfully May 17 00:34:39.138661 kernel: audit: type=1400 audit(1747442079.103:447): avc: denied { mac_admin } for pid=2264 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:39.138765 kernel: audit: type=1401 audit(1747442079.103:447): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:34:39.103000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:34:39.138840 kubelet[2264]: W0517 00:34:39.138052 2264 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://172.31.29.247:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.29.247:6443: connect: connection refused May 17 00:34:39.138840 kubelet[2264]: E0517 00:34:39.138111 2264 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://172.31.29.247:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 172.31.29.247:6443: connect: connection refused" logger="UnhandledError" May 17 00:34:39.103000 audit[2264]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000580e40 a1=c000a327e0 a2=c000571650 a3=25 items=0 ppid=1 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:39.152677 kernel: audit: type=1300 audit(1747442079.103:447): arch=c000003e syscall=188 success=no exit=-22 a0=c000580e40 a1=c000a327e0 a2=c000571650 a3=25 items=0 ppid=1 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:39.152799 kernel: audit: type=1327 audit(1747442079.103:447): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:34:39.103000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:34:39.126000 audit[2275]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2275 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:39.126000 audit[2275]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcef26e420 a2=0 a3=7ffcef26e40c items=0 ppid=2264 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:39.162511 kubelet[2264]: I0517 00:34:39.162487 2264 cpu_manager.go:214] "Starting CPU manager" policy="none" May 17 00:34:39.162819 kubelet[2264]: I0517 00:34:39.162803 2264 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 17 00:34:39.162921 kubelet[2264]: I0517 00:34:39.162912 2264 state_mem.go:36] "Initialized new in-memory state store" May 17 00:34:39.167969 kernel: audit: type=1325 audit(1747442079.126:448): table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2275 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:39.170458 kernel: audit: type=1300 audit(1747442079.126:448): arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcef26e420 a2=0 a3=7ffcef26e40c items=0 ppid=2264 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:39.126000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:34:39.128000 audit[2276]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2276 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:39.128000 audit[2276]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea822e060 a2=0 a3=7ffea822e04c items=0 ppid=2264 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:39.128000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:34:39.145000 audit[2279]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2279 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:39.145000 audit[2279]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc9d1e5160 a2=0 a3=7ffc9d1e514c items=0 ppid=2264 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:39.145000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:34:39.152000 audit[2281]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2281 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:39.152000 audit[2281]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd2ce09c90 a2=0 a3=7ffd2ce09c7c items=0 ppid=2264 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:39.152000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:34:39.172522 kubelet[2264]: I0517 00:34:39.172501 2264 policy_none.go:49] "None policy: Start" May 17 00:34:39.173909 kubelet[2264]: I0517 00:34:39.173868 2264 memory_manager.go:170] "Starting memorymanager" policy="None" May 17 00:34:39.173909 kubelet[2264]: I0517 00:34:39.173896 2264 state_mem.go:35] "Initializing new in-memory state store" May 17 00:34:39.183174 systemd[1]: Created slice kubepods.slice. May 17 00:34:39.187000 audit[2286]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2286 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:39.187000 audit[2286]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffdb13c8a10 a2=0 a3=7ffdb13c89fc items=0 ppid=2264 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:39.187000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 17 00:34:39.189224 kubelet[2264]: I0517 00:34:39.188321 2264 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 17 00:34:39.189616 systemd[1]: Created slice kubepods-burstable.slice. May 17 00:34:39.192000 audit[2287]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=2287 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:39.192000 audit[2287]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdc1981c40 a2=0 a3=7ffdc1981c2c items=0 ppid=2264 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:39.192000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:34:39.193512 kubelet[2264]: I0517 00:34:39.193488 2264 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 17 00:34:39.193750 kubelet[2264]: I0517 00:34:39.193717 2264 status_manager.go:217] "Starting to sync pod status with apiserver" May 17 00:34:39.193750 kubelet[2264]: I0517 00:34:39.193746 2264 kubelet.go:2321] "Starting kubelet main sync loop" May 17 00:34:39.193866 kubelet[2264]: E0517 00:34:39.193796 2264 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 17 00:34:39.195000 audit[2288]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=2288 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:39.195000 audit[2288]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffede97ae90 a2=0 a3=7ffede97ae7c items=0 ppid=2264 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:39.195000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:34:39.196545 kubelet[2264]: W0517 00:34:39.195968 2264 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://172.31.29.247:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.29.247:6443: connect: connection refused May 17 00:34:39.196545 kubelet[2264]: E0517 00:34:39.196070 2264 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://172.31.29.247:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 172.31.29.247:6443: connect: connection refused" logger="UnhandledError" May 17 00:34:39.198000 audit[2290]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=2290 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:39.198000 audit[2290]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff3b409b80 a2=0 a3=7fff3b409b6c items=0 ppid=2264 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:39.198000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:34:39.200129 systemd[1]: Created slice kubepods-besteffort.slice. May 17 00:34:39.200000 audit[2292]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2292 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:39.200000 audit[2292]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcfdefc4b0 a2=0 a3=7ffcfdefc49c items=0 ppid=2264 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:39.200000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:34:39.202000 audit[2294]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=2294 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:39.202000 audit[2294]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd0fec8db0 a2=0 a3=7ffd0fec8d9c items=0 ppid=2264 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:39.203000 audit[2293]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=2293 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:39.203000 audit[2293]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffff5e55630 a2=0 a3=10e3 items=0 ppid=2264 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:39.203000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:34:39.202000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:34:39.204000 audit[2295]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=2295 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:39.204000 audit[2295]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcc55a88a0 a2=0 a3=7ffcc55a888c items=0 ppid=2264 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:39.204000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:34:39.206678 kubelet[2264]: I0517 00:34:39.206644 2264 manager.go:513] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 17 00:34:39.205000 audit[2264]: AVC avc: denied { mac_admin } for pid=2264 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:39.205000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:34:39.205000 audit[2264]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b9d5f0 a1=c000bde8a0 a2=c000b9d5c0 a3=25 items=0 ppid=1 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:39.205000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:34:39.208550 kubelet[2264]: I0517 00:34:39.208509 2264 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 17 00:34:39.208680 kubelet[2264]: I0517 00:34:39.208661 2264 eviction_manager.go:189] "Eviction manager: starting control loop" May 17 00:34:39.208770 kubelet[2264]: I0517 00:34:39.208680 2264 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 17 00:34:39.210340 kubelet[2264]: E0517 00:34:39.210016 2264 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ip-172-31-29-247\" not found" May 17 00:34:39.210753 kubelet[2264]: I0517 00:34:39.210636 2264 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 17 00:34:39.304088 systemd[1]: Created slice kubepods-burstable-podf11fa25da144b5c82e6e2b90bc8e5405.slice. May 17 00:34:39.311931 kubelet[2264]: I0517 00:34:39.311892 2264 kubelet_node_status.go:72] "Attempting to register node" node="ip-172-31-29-247" May 17 00:34:39.312209 kubelet[2264]: E0517 00:34:39.312184 2264 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://172.31.29.247:6443/api/v1/nodes\": dial tcp 172.31.29.247:6443: connect: connection refused" node="ip-172-31-29-247" May 17 00:34:39.316339 systemd[1]: Created slice kubepods-burstable-podaf70725db32c89120090cb6e46ebce95.slice. May 17 00:34:39.327134 systemd[1]: Created slice kubepods-burstable-pod77ebb9481f96b404ba85b6921c799a22.slice. May 17 00:34:39.332046 kubelet[2264]: I0517 00:34:39.332016 2264 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/af70725db32c89120090cb6e46ebce95-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-29-247\" (UID: \"af70725db32c89120090cb6e46ebce95\") " pod="kube-system/kube-controller-manager-ip-172-31-29-247" May 17 00:34:39.332290 kubelet[2264]: I0517 00:34:39.332268 2264 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/77ebb9481f96b404ba85b6921c799a22-kubeconfig\") pod \"kube-scheduler-ip-172-31-29-247\" (UID: \"77ebb9481f96b404ba85b6921c799a22\") " pod="kube-system/kube-scheduler-ip-172-31-29-247" May 17 00:34:39.332339 kubelet[2264]: I0517 00:34:39.332303 2264 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/f11fa25da144b5c82e6e2b90bc8e5405-k8s-certs\") pod \"kube-apiserver-ip-172-31-29-247\" (UID: \"f11fa25da144b5c82e6e2b90bc8e5405\") " pod="kube-system/kube-apiserver-ip-172-31-29-247" May 17 00:34:39.332339 kubelet[2264]: I0517 00:34:39.332320 2264 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/af70725db32c89120090cb6e46ebce95-k8s-certs\") pod \"kube-controller-manager-ip-172-31-29-247\" (UID: \"af70725db32c89120090cb6e46ebce95\") " pod="kube-system/kube-controller-manager-ip-172-31-29-247" May 17 00:34:39.332339 kubelet[2264]: I0517 00:34:39.332342 2264 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/af70725db32c89120090cb6e46ebce95-kubeconfig\") pod \"kube-controller-manager-ip-172-31-29-247\" (UID: \"af70725db32c89120090cb6e46ebce95\") " pod="kube-system/kube-controller-manager-ip-172-31-29-247" May 17 00:34:39.332447 kubelet[2264]: I0517 00:34:39.332362 2264 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/af70725db32c89120090cb6e46ebce95-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-29-247\" (UID: \"af70725db32c89120090cb6e46ebce95\") " pod="kube-system/kube-controller-manager-ip-172-31-29-247" May 17 00:34:39.332447 kubelet[2264]: I0517 00:34:39.332376 2264 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/f11fa25da144b5c82e6e2b90bc8e5405-ca-certs\") pod \"kube-apiserver-ip-172-31-29-247\" (UID: \"f11fa25da144b5c82e6e2b90bc8e5405\") " pod="kube-system/kube-apiserver-ip-172-31-29-247" May 17 00:34:39.332447 kubelet[2264]: I0517 00:34:39.332391 2264 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/f11fa25da144b5c82e6e2b90bc8e5405-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-29-247\" (UID: \"f11fa25da144b5c82e6e2b90bc8e5405\") " pod="kube-system/kube-apiserver-ip-172-31-29-247" May 17 00:34:39.332447 kubelet[2264]: I0517 00:34:39.332405 2264 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/af70725db32c89120090cb6e46ebce95-ca-certs\") pod \"kube-controller-manager-ip-172-31-29-247\" (UID: \"af70725db32c89120090cb6e46ebce95\") " pod="kube-system/kube-controller-manager-ip-172-31-29-247" May 17 00:34:39.332657 kubelet[2264]: E0517 00:34:39.332602 2264 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.29.247:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-29-247?timeout=10s\": dial tcp 172.31.29.247:6443: connect: connection refused" interval="400ms" May 17 00:34:39.514089 kubelet[2264]: I0517 00:34:39.514061 2264 kubelet_node_status.go:72] "Attempting to register node" node="ip-172-31-29-247" May 17 00:34:39.514473 kubelet[2264]: E0517 00:34:39.514443 2264 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://172.31.29.247:6443/api/v1/nodes\": dial tcp 172.31.29.247:6443: connect: connection refused" node="ip-172-31-29-247" May 17 00:34:39.615114 env[1754]: time="2025-05-17T00:34:39.614994108Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-29-247,Uid:f11fa25da144b5c82e6e2b90bc8e5405,Namespace:kube-system,Attempt:0,}" May 17 00:34:39.626106 env[1754]: time="2025-05-17T00:34:39.625772420Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-29-247,Uid:af70725db32c89120090cb6e46ebce95,Namespace:kube-system,Attempt:0,}" May 17 00:34:39.631114 env[1754]: time="2025-05-17T00:34:39.631066906Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-29-247,Uid:77ebb9481f96b404ba85b6921c799a22,Namespace:kube-system,Attempt:0,}" May 17 00:34:39.734631 kubelet[2264]: E0517 00:34:39.734550 2264 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.29.247:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-29-247?timeout=10s\": dial tcp 172.31.29.247:6443: connect: connection refused" interval="800ms" May 17 00:34:39.916519 kubelet[2264]: I0517 00:34:39.916474 2264 kubelet_node_status.go:72] "Attempting to register node" node="ip-172-31-29-247" May 17 00:34:39.916839 kubelet[2264]: E0517 00:34:39.916802 2264 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://172.31.29.247:6443/api/v1/nodes\": dial tcp 172.31.29.247:6443: connect: connection refused" node="ip-172-31-29-247" May 17 00:34:40.153867 kubelet[2264]: W0517 00:34:40.153824 2264 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://172.31.29.247:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.29.247:6443: connect: connection refused May 17 00:34:40.154015 kubelet[2264]: E0517 00:34:40.153873 2264 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://172.31.29.247:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 172.31.29.247:6443: connect: connection refused" logger="UnhandledError" May 17 00:34:40.172568 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1565168903.mount: Deactivated successfully. May 17 00:34:40.189759 env[1754]: time="2025-05-17T00:34:40.189686620Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:40.193979 env[1754]: time="2025-05-17T00:34:40.193885622Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:40.199124 env[1754]: time="2025-05-17T00:34:40.199055460Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:40.201282 env[1754]: time="2025-05-17T00:34:40.201238350Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:40.203169 env[1754]: time="2025-05-17T00:34:40.203126049Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:40.205565 env[1754]: time="2025-05-17T00:34:40.205520952Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:40.207844 env[1754]: time="2025-05-17T00:34:40.207791708Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:40.210105 env[1754]: time="2025-05-17T00:34:40.210062430Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:40.213975 env[1754]: time="2025-05-17T00:34:40.213921794Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:40.216165 env[1754]: time="2025-05-17T00:34:40.216120539Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:40.222981 env[1754]: time="2025-05-17T00:34:40.222916171Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:40.238349 env[1754]: time="2025-05-17T00:34:40.238294573Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:40.273636 kubelet[2264]: W0517 00:34:40.273511 2264 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.31.29.247:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-29-247&limit=500&resourceVersion=0": dial tcp 172.31.29.247:6443: connect: connection refused May 17 00:34:40.273636 kubelet[2264]: E0517 00:34:40.273598 2264 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://172.31.29.247:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-29-247&limit=500&resourceVersion=0\": dial tcp 172.31.29.247:6443: connect: connection refused" logger="UnhandledError" May 17 00:34:40.275776 env[1754]: time="2025-05-17T00:34:40.275681481Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:34:40.275988 env[1754]: time="2025-05-17T00:34:40.275800874Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:34:40.275988 env[1754]: time="2025-05-17T00:34:40.275844314Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:34:40.275988 env[1754]: time="2025-05-17T00:34:40.275858859Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:34:40.276199 env[1754]: time="2025-05-17T00:34:40.276048765Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2340235b4778d0efa71e619b87552da6937e5c936ec38a31af9869608f4feaba pid=2314 runtime=io.containerd.runc.v2 May 17 00:34:40.276389 env[1754]: time="2025-05-17T00:34:40.276346641Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:34:40.276523 env[1754]: time="2025-05-17T00:34:40.276495086Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:34:40.276935 env[1754]: time="2025-05-17T00:34:40.276889048Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/042477d1a1848b108a0847f6d98ca6c1a64643529e1f4894cc23720e500d5703 pid=2305 runtime=io.containerd.runc.v2 May 17 00:34:40.296434 kubelet[2264]: W0517 00:34:40.296328 2264 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://172.31.29.247:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.29.247:6443: connect: connection refused May 17 00:34:40.296434 kubelet[2264]: E0517 00:34:40.296388 2264 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://172.31.29.247:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 172.31.29.247:6443: connect: connection refused" logger="UnhandledError" May 17 00:34:40.301413 systemd[1]: Started cri-containerd-2340235b4778d0efa71e619b87552da6937e5c936ec38a31af9869608f4feaba.scope. May 17 00:34:40.322622 systemd[1]: Started cri-containerd-042477d1a1848b108a0847f6d98ca6c1a64643529e1f4894cc23720e500d5703.scope. May 17 00:34:40.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.339000 audit: BPF prog-id=64 op=LOAD May 17 00:34:40.341000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.341000 audit[2332]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2314 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:40.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233343032333562343737386430656661373165363139623837353532 May 17 00:34:40.341000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.341000 audit[2332]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2314 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:40.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233343032333562343737386430656661373165363139623837353532 May 17 00:34:40.341000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.341000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.341000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.341000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.341000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.341000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.341000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.341000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.341000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.341000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.341000 audit: BPF prog-id=65 op=LOAD May 17 00:34:40.341000 audit[2332]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000253c0 items=0 ppid=2314 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:40.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233343032333562343737386430656661373165363139623837353532 May 17 00:34:40.342000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.342000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.342000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.342000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.342000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.342000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.342000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.342000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.342000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.342000 audit: BPF prog-id=66 op=LOAD May 17 00:34:40.342000 audit[2332]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000025408 items=0 ppid=2314 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:40.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233343032333562343737386430656661373165363139623837353532 May 17 00:34:40.342000 audit: BPF prog-id=66 op=UNLOAD May 17 00:34:40.342000 audit: BPF prog-id=65 op=UNLOAD May 17 00:34:40.342000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.342000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.342000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.342000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.342000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.342000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.342000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.342000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.342000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.342000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.342000 audit: BPF prog-id=67 op=LOAD May 17 00:34:40.342000 audit[2332]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000025818 items=0 ppid=2314 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:40.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233343032333562343737386430656661373165363139623837353532 May 17 00:34:40.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.346000 audit: BPF prog-id=68 op=LOAD May 17 00:34:40.347000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.347000 audit[2333]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2305 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:40.347000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034323437376431613138343862313038613038343766366439386361 May 17 00:34:40.348000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.348000 audit[2333]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2305 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:40.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034323437376431613138343862313038613038343766366439386361 May 17 00:34:40.348000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.348000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.348000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.348000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.348000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.348000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.348000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.348000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.348000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.348000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.348000 audit: BPF prog-id=69 op=LOAD May 17 00:34:40.348000 audit[2333]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0001982e0 items=0 ppid=2305 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:40.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034323437376431613138343862313038613038343766366439386361 May 17 00:34:40.348000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.348000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.348000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.348000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.348000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.348000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.348000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.348000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.348000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.348000 audit: BPF prog-id=70 op=LOAD May 17 00:34:40.348000 audit[2333]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000198328 items=0 ppid=2305 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:40.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034323437376431613138343862313038613038343766366439386361 May 17 00:34:40.348000 audit: BPF prog-id=70 op=UNLOAD May 17 00:34:40.348000 audit: BPF prog-id=69 op=UNLOAD May 17 00:34:40.348000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.348000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.348000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.348000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.348000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.348000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.348000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.348000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.348000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.348000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.348000 audit: BPF prog-id=71 op=LOAD May 17 00:34:40.348000 audit[2333]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000198738 items=0 ppid=2305 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:40.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034323437376431613138343862313038613038343766366439386361 May 17 00:34:40.358079 env[1754]: time="2025-05-17T00:34:40.357988767Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:34:40.358358 env[1754]: time="2025-05-17T00:34:40.358320611Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:34:40.358491 env[1754]: time="2025-05-17T00:34:40.358467716Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:34:40.358860 env[1754]: time="2025-05-17T00:34:40.358814213Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6c1fe9080055887b2f05f81649e6c7cd6802dd1026929c0c60f23848ebc4bea6 pid=2371 runtime=io.containerd.runc.v2 May 17 00:34:40.391512 systemd[1]: Started cri-containerd-6c1fe9080055887b2f05f81649e6c7cd6802dd1026929c0c60f23848ebc4bea6.scope. May 17 00:34:40.419635 env[1754]: time="2025-05-17T00:34:40.419566971Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-29-247,Uid:af70725db32c89120090cb6e46ebce95,Namespace:kube-system,Attempt:0,} returns sandbox id \"2340235b4778d0efa71e619b87552da6937e5c936ec38a31af9869608f4feaba\"" May 17 00:34:40.427110 env[1754]: time="2025-05-17T00:34:40.427010139Z" level=info msg="CreateContainer within sandbox \"2340235b4778d0efa71e619b87552da6937e5c936ec38a31af9869608f4feaba\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 17 00:34:40.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.427000 audit: BPF prog-id=72 op=LOAD May 17 00:34:40.433000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.433000 audit[2380]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2371 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:40.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663316665393038303035353838376232663035663831363439653663 May 17 00:34:40.434000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.434000 audit[2380]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2371 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:40.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663316665393038303035353838376232663035663831363439653663 May 17 00:34:40.434000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.434000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.434000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.434000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.434000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.434000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.434000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.434000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.434000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.434000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.434000 audit: BPF prog-id=73 op=LOAD May 17 00:34:40.434000 audit[2380]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001a91f0 items=0 ppid=2371 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:40.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663316665393038303035353838376232663035663831363439653663 May 17 00:34:40.435000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.435000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.435000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.435000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.435000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.435000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.435000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.435000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.435000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.435000 audit: BPF prog-id=74 op=LOAD May 17 00:34:40.435000 audit[2380]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001a9238 items=0 ppid=2371 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:40.435000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663316665393038303035353838376232663035663831363439653663 May 17 00:34:40.436000 audit: BPF prog-id=74 op=UNLOAD May 17 00:34:40.436000 audit: BPF prog-id=73 op=UNLOAD May 17 00:34:40.436000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.436000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.436000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.436000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.436000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.436000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.436000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.436000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.436000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.436000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.436000 audit: BPF prog-id=75 op=LOAD May 17 00:34:40.436000 audit[2380]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0001a9648 items=0 ppid=2371 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:40.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663316665393038303035353838376232663035663831363439653663 May 17 00:34:40.443187 env[1754]: time="2025-05-17T00:34:40.443136324Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-29-247,Uid:f11fa25da144b5c82e6e2b90bc8e5405,Namespace:kube-system,Attempt:0,} returns sandbox id \"042477d1a1848b108a0847f6d98ca6c1a64643529e1f4894cc23720e500d5703\"" May 17 00:34:40.448807 env[1754]: time="2025-05-17T00:34:40.448692548Z" level=info msg="CreateContainer within sandbox \"042477d1a1848b108a0847f6d98ca6c1a64643529e1f4894cc23720e500d5703\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 17 00:34:40.474208 env[1754]: time="2025-05-17T00:34:40.474160413Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-29-247,Uid:77ebb9481f96b404ba85b6921c799a22,Namespace:kube-system,Attempt:0,} returns sandbox id \"6c1fe9080055887b2f05f81649e6c7cd6802dd1026929c0c60f23848ebc4bea6\"" May 17 00:34:40.477025 env[1754]: time="2025-05-17T00:34:40.476980287Z" level=info msg="CreateContainer within sandbox \"6c1fe9080055887b2f05f81649e6c7cd6802dd1026929c0c60f23848ebc4bea6\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 17 00:34:40.503458 env[1754]: time="2025-05-17T00:34:40.503396521Z" level=info msg="CreateContainer within sandbox \"042477d1a1848b108a0847f6d98ca6c1a64643529e1f4894cc23720e500d5703\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"8c8191b0838eb3f374afb20c566daa653bc57d6cf5535b08af5857b6cbcfebf7\"" May 17 00:34:40.506094 env[1754]: time="2025-05-17T00:34:40.505838294Z" level=info msg="CreateContainer within sandbox \"2340235b4778d0efa71e619b87552da6937e5c936ec38a31af9869608f4feaba\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"a579bd2513ca3de75f2e9040683fd93f0aa556467840cd61c26628ed35bd7c90\"" May 17 00:34:40.506500 env[1754]: time="2025-05-17T00:34:40.506457089Z" level=info msg="StartContainer for \"a579bd2513ca3de75f2e9040683fd93f0aa556467840cd61c26628ed35bd7c90\"" May 17 00:34:40.511923 env[1754]: time="2025-05-17T00:34:40.511856682Z" level=info msg="CreateContainer within sandbox \"6c1fe9080055887b2f05f81649e6c7cd6802dd1026929c0c60f23848ebc4bea6\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"8961469ceb78a89d279637a806250fb9bd35f4188679741f14dcc6fd76e453ac\"" May 17 00:34:40.512161 env[1754]: time="2025-05-17T00:34:40.512071549Z" level=info msg="StartContainer for \"8c8191b0838eb3f374afb20c566daa653bc57d6cf5535b08af5857b6cbcfebf7\"" May 17 00:34:40.514661 env[1754]: time="2025-05-17T00:34:40.514624704Z" level=info msg="StartContainer for \"8961469ceb78a89d279637a806250fb9bd35f4188679741f14dcc6fd76e453ac\"" May 17 00:34:40.535236 kubelet[2264]: E0517 00:34:40.535183 2264 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.29.247:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-29-247?timeout=10s\": dial tcp 172.31.29.247:6443: connect: connection refused" interval="1.6s" May 17 00:34:40.542023 systemd[1]: Started cri-containerd-a579bd2513ca3de75f2e9040683fd93f0aa556467840cd61c26628ed35bd7c90.scope. May 17 00:34:40.555592 systemd[1]: Started cri-containerd-8c8191b0838eb3f374afb20c566daa653bc57d6cf5535b08af5857b6cbcfebf7.scope. May 17 00:34:40.565737 systemd[1]: Started cri-containerd-8961469ceb78a89d279637a806250fb9bd35f4188679741f14dcc6fd76e453ac.scope. May 17 00:34:40.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.580000 audit: BPF prog-id=76 op=LOAD May 17 00:34:40.581000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.581000 audit[2431]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2314 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:40.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135373962643235313363613364653735663265393034303638336664 May 17 00:34:40.581000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.581000 audit[2431]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2314 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:40.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135373962643235313363613364653735663265393034303638336664 May 17 00:34:40.581000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.581000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.581000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.581000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.581000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.581000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.581000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.581000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.581000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.581000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.581000 audit: BPF prog-id=77 op=LOAD May 17 00:34:40.581000 audit[2431]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00028b780 items=0 ppid=2314 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:40.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135373962643235313363613364653735663265393034303638336664 May 17 00:34:40.581000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.581000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.581000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.581000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.581000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.581000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.581000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.581000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.581000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.581000 audit: BPF prog-id=78 op=LOAD May 17 00:34:40.581000 audit[2431]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00028b7c8 items=0 ppid=2314 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:40.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135373962643235313363613364653735663265393034303638336664 May 17 00:34:40.581000 audit: BPF prog-id=78 op=UNLOAD May 17 00:34:40.582000 audit: BPF prog-id=77 op=UNLOAD May 17 00:34:40.582000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.582000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.582000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.582000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.582000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.582000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.582000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.582000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.582000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.582000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.582000 audit: BPF prog-id=79 op=LOAD May 17 00:34:40.582000 audit[2431]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00028bbd8 items=0 ppid=2314 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:40.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135373962643235313363613364653735663265393034303638336664 May 17 00:34:40.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.589000 audit: BPF prog-id=80 op=LOAD May 17 00:34:40.590000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.590000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2305 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:40.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863383139316230383338656233663337346166623230633536366461 May 17 00:34:40.591000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.591000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2305 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:40.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863383139316230383338656233663337346166623230633536366461 May 17 00:34:40.591000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.591000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.591000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.591000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.591000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.591000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.591000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.591000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.591000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.591000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.591000 audit: BPF prog-id=81 op=LOAD May 17 00:34:40.591000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0001d7ba0 items=0 ppid=2305 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:40.594165 kubelet[2264]: W0517 00:34:40.594033 2264 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.31.29.247:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 172.31.29.247:6443: connect: connection refused May 17 00:34:40.594165 kubelet[2264]: E0517 00:34:40.594128 2264 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://172.31.29.247:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 172.31.29.247:6443: connect: connection refused" logger="UnhandledError" May 17 00:34:40.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863383139316230383338656233663337346166623230633536366461 May 17 00:34:40.593000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.593000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.593000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.593000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.593000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.593000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.593000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.593000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.593000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.593000 audit: BPF prog-id=82 op=LOAD May 17 00:34:40.593000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0001d7be8 items=0 ppid=2305 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:40.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863383139316230383338656233663337346166623230633536366461 May 17 00:34:40.594000 audit: BPF prog-id=82 op=UNLOAD May 17 00:34:40.594000 audit: BPF prog-id=81 op=UNLOAD May 17 00:34:40.595000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.595000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.595000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.595000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.595000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.595000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.595000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.595000 audit[2444]: AVC avc: denied { perfmon } for pid=2444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.595000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.595000 audit[2444]: AVC avc: denied { bpf } for pid=2444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.595000 audit: BPF prog-id=83 op=LOAD May 17 00:34:40.595000 audit[2444]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0001d7ff8 items=0 ppid=2305 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:40.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863383139316230383338656233663337346166623230633536366461 May 17 00:34:40.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.631000 audit: BPF prog-id=84 op=LOAD May 17 00:34:40.633000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.633000 audit[2443]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2371 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:40.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839363134363963656237386138396432373936333761383036323530 May 17 00:34:40.633000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.633000 audit[2443]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2371 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:40.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839363134363963656237386138396432373936333761383036323530 May 17 00:34:40.633000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.633000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.633000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.633000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.633000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.633000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.633000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.633000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.633000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.633000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.633000 audit: BPF prog-id=85 op=LOAD May 17 00:34:40.633000 audit[2443]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002d9d10 items=0 ppid=2371 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:40.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839363134363963656237386138396432373936333761383036323530 May 17 00:34:40.633000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.633000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.633000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.633000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.633000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.633000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.633000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.633000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.633000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.633000 audit: BPF prog-id=86 op=LOAD May 17 00:34:40.633000 audit[2443]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002d9d58 items=0 ppid=2371 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:40.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839363134363963656237386138396432373936333761383036323530 May 17 00:34:40.633000 audit: BPF prog-id=86 op=UNLOAD May 17 00:34:40.633000 audit: BPF prog-id=85 op=UNLOAD May 17 00:34:40.633000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.633000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.633000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.633000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.633000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.633000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.633000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.633000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.633000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.633000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:40.633000 audit: BPF prog-id=87 op=LOAD May 17 00:34:40.633000 audit[2443]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d4168 items=0 ppid=2371 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:40.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839363134363963656237386138396432373936333761383036323530 May 17 00:34:40.657367 env[1754]: time="2025-05-17T00:34:40.657311010Z" level=info msg="StartContainer for \"8c8191b0838eb3f374afb20c566daa653bc57d6cf5535b08af5857b6cbcfebf7\" returns successfully" May 17 00:34:40.673510 env[1754]: time="2025-05-17T00:34:40.673453528Z" level=info msg="StartContainer for \"a579bd2513ca3de75f2e9040683fd93f0aa556467840cd61c26628ed35bd7c90\" returns successfully" May 17 00:34:40.704005 env[1754]: time="2025-05-17T00:34:40.703890213Z" level=info msg="StartContainer for \"8961469ceb78a89d279637a806250fb9bd35f4188679741f14dcc6fd76e453ac\" returns successfully" May 17 00:34:40.719344 kubelet[2264]: I0517 00:34:40.719308 2264 kubelet_node_status.go:72] "Attempting to register node" node="ip-172-31-29-247" May 17 00:34:40.719841 kubelet[2264]: E0517 00:34:40.719806 2264 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://172.31.29.247:6443/api/v1/nodes\": dial tcp 172.31.29.247:6443: connect: connection refused" node="ip-172-31-29-247" May 17 00:34:41.043750 kubelet[2264]: E0517 00:34:41.043610 2264 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://172.31.29.247:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 172.31.29.247:6443: connect: connection refused" logger="UnhandledError" May 17 00:34:41.712000 audit[2468]: AVC avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:41.712000 audit[2468]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0000f9590 a2=fc6 a3=0 items=0 ppid=2314 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 key=(null) May 17 00:34:41.712000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:34:41.713000 audit[2468]: AVC avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:41.713000 audit[2468]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0000572a0 a2=fc6 a3=0 items=0 ppid=2314 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 key=(null) May 17 00:34:41.713000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:34:42.064072 kubelet[2264]: W0517 00:34:42.063932 2264 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://172.31.29.247:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.29.247:6443: connect: connection refused May 17 00:34:42.064072 kubelet[2264]: E0517 00:34:42.064006 2264 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://172.31.29.247:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 172.31.29.247:6443: connect: connection refused" logger="UnhandledError" May 17 00:34:42.136131 kubelet[2264]: E0517 00:34:42.136064 2264 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.29.247:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-29-247?timeout=10s\": dial tcp 172.31.29.247:6443: connect: connection refused" interval="3.2s" May 17 00:34:42.321602 kubelet[2264]: I0517 00:34:42.321498 2264 kubelet_node_status.go:72] "Attempting to register node" node="ip-172-31-29-247" May 17 00:34:42.322082 kubelet[2264]: E0517 00:34:42.321904 2264 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://172.31.29.247:6443/api/v1/nodes\": dial tcp 172.31.29.247:6443: connect: connection refused" node="ip-172-31-29-247" May 17 00:34:42.433167 kubelet[2264]: E0517 00:34:42.433054 2264 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://172.31.29.247:6443/api/v1/namespaces/default/events\": dial tcp 172.31.29.247:6443: connect: connection refused" event="&Event{ObjectMeta:{ip-172-31-29-247.184029500626cc4a default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ip-172-31-29-247,UID:ip-172-31-29-247,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ip-172-31-29-247,},FirstTimestamp:2025-05-17 00:34:39.097080906 +0000 UTC m=+0.581990889,LastTimestamp:2025-05-17 00:34:39.097080906 +0000 UTC m=+0.581990889,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ip-172-31-29-247,}" May 17 00:34:42.929912 kubelet[2264]: W0517 00:34:42.929819 2264 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://172.31.29.247:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.29.247:6443: connect: connection refused May 17 00:34:42.929912 kubelet[2264]: E0517 00:34:42.929886 2264 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://172.31.29.247:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 172.31.29.247:6443: connect: connection refused" logger="UnhandledError" May 17 00:34:43.420093 kubelet[2264]: W0517 00:34:43.420022 2264 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.31.29.247:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-29-247&limit=500&resourceVersion=0": dial tcp 172.31.29.247:6443: connect: connection refused May 17 00:34:43.420490 kubelet[2264]: E0517 00:34:43.420104 2264 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://172.31.29.247:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-29-247&limit=500&resourceVersion=0\": dial tcp 172.31.29.247:6443: connect: connection refused" logger="UnhandledError" May 17 00:34:43.446282 amazon-ssm-agent[1716]: 2025-05-17 00:34:43 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated May 17 00:34:43.460116 kubelet[2264]: W0517 00:34:43.460046 2264 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.31.29.247:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 172.31.29.247:6443: connect: connection refused May 17 00:34:43.460277 kubelet[2264]: E0517 00:34:43.460125 2264 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://172.31.29.247:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 172.31.29.247:6443: connect: connection refused" logger="UnhandledError" May 17 00:34:45.234000 audit[2477]: AVC avc: denied { watch } for pid=2477 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c831,c866 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:45.237070 kernel: kauditd_printk_skb: 386 callbacks suppressed May 17 00:34:45.237205 kernel: audit: type=1400 audit(1747442085.234:571): avc: denied { watch } for pid=2477 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c831,c866 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:45.234000 audit[2477]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c004b76300 a2=fc6 a3=0 items=0 ppid=2305 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c831,c866 key=(null) May 17 00:34:45.255454 kernel: audit: type=1300 audit(1747442085.234:571): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c004b76300 a2=fc6 a3=0 items=0 ppid=2305 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c831,c866 key=(null) May 17 00:34:45.264651 kernel: audit: type=1327 audit(1747442085.234:571): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32392E323437002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:34:45.234000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32392E323437002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:34:45.235000 audit[2477]: AVC avc: denied { watch } for pid=2477 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c831,c866 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:45.277753 kernel: audit: type=1400 audit(1747442085.235:572): avc: denied { watch } for pid=2477 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c831,c866 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:45.294252 kernel: audit: type=1300 audit(1747442085.235:572): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c004b76360 a2=fc6 a3=0 items=0 ppid=2305 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c831,c866 key=(null) May 17 00:34:45.235000 audit[2477]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c004b76360 a2=fc6 a3=0 items=0 ppid=2305 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c831,c866 key=(null) May 17 00:34:45.235000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32392E323437002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:34:45.308737 kernel: audit: type=1327 audit(1747442085.235:572): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32392E323437002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:34:45.253000 audit[2477]: AVC avc: denied { watch } for pid=2477 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c831,c866 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:45.317724 kernel: audit: type=1400 audit(1747442085.253:573): avc: denied { watch } for pid=2477 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c831,c866 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:45.253000 audit[2477]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4a a1=c004abb020 a2=fc6 a3=0 items=0 ppid=2305 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c831,c866 key=(null) May 17 00:34:45.328730 kernel: audit: type=1300 audit(1747442085.253:573): arch=c000003e syscall=254 success=no exit=-13 a0=4a a1=c004abb020 a2=fc6 a3=0 items=0 ppid=2305 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c831,c866 key=(null) May 17 00:34:45.253000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32392E323437002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:34:45.254000 audit[2477]: AVC avc: denied { watch } for pid=2477 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c831,c866 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:45.345741 kernel: audit: type=1327 audit(1747442085.253:573): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32392E323437002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:34:45.345896 kernel: audit: type=1400 audit(1747442085.254:574): avc: denied { watch } for pid=2477 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c831,c866 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:45.254000 audit[2477]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4a a1=c0058bd4a0 a2=fc6 a3=0 items=0 ppid=2305 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c831,c866 key=(null) May 17 00:34:45.254000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32392E323437002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:34:45.346000 audit[2477]: AVC avc: denied { watch } for pid=2477 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c831,c866 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:45.346000 audit[2477]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=81 a1=c005a2f100 a2=fc6 a3=0 items=0 ppid=2305 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c831,c866 key=(null) May 17 00:34:45.346000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32392E323437002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:34:45.378000 audit[2477]: AVC avc: denied { watch } for pid=2477 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c831,c866 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:45.378000 audit[2477]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=86 a1=c0037575f0 a2=fc6 a3=0 items=0 ppid=2305 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c831,c866 key=(null) May 17 00:34:45.378000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32392E323437002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:34:45.449610 kubelet[2264]: E0517 00:34:45.449574 2264 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ip-172-31-29-247\" not found" node="ip-172-31-29-247" May 17 00:34:45.524174 kubelet[2264]: I0517 00:34:45.524088 2264 kubelet_node_status.go:72] "Attempting to register node" node="ip-172-31-29-247" May 17 00:34:45.540332 kubelet[2264]: I0517 00:34:45.540285 2264 kubelet_node_status.go:75] "Successfully registered node" node="ip-172-31-29-247" May 17 00:34:45.540484 kubelet[2264]: E0517 00:34:45.540358 2264 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"ip-172-31-29-247\": node \"ip-172-31-29-247\" not found" May 17 00:34:45.552604 kubelet[2264]: E0517 00:34:45.552564 2264 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-29-247\" not found" May 17 00:34:45.653505 kubelet[2264]: E0517 00:34:45.653443 2264 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-29-247\" not found" May 17 00:34:45.754374 kubelet[2264]: E0517 00:34:45.754315 2264 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-29-247\" not found" May 17 00:34:45.855121 kubelet[2264]: E0517 00:34:45.854995 2264 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-29-247\" not found" May 17 00:34:45.955916 kubelet[2264]: E0517 00:34:45.955870 2264 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-29-247\" not found" May 17 00:34:46.057010 kubelet[2264]: E0517 00:34:46.056966 2264 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-29-247\" not found" May 17 00:34:46.158101 kubelet[2264]: E0517 00:34:46.158037 2264 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-29-247\" not found" May 17 00:34:46.258637 kubelet[2264]: E0517 00:34:46.258590 2264 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-29-247\" not found" May 17 00:34:46.359565 kubelet[2264]: E0517 00:34:46.359526 2264 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-29-247\" not found" May 17 00:34:46.460150 kubelet[2264]: E0517 00:34:46.460042 2264 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-29-247\" not found" May 17 00:34:46.560869 kubelet[2264]: E0517 00:34:46.560827 2264 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-29-247\" not found" May 17 00:34:46.662011 kubelet[2264]: E0517 00:34:46.661866 2264 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-29-247\" not found" May 17 00:34:47.098843 kubelet[2264]: I0517 00:34:47.098812 2264 apiserver.go:52] "Watching apiserver" May 17 00:34:47.126868 kubelet[2264]: I0517 00:34:47.126814 2264 desired_state_of_world_populator.go:155] "Finished populating initial desired state of world" May 17 00:34:47.491535 systemd[1]: Reloading. May 17 00:34:47.596986 /usr/lib/systemd/system-generators/torcx-generator[2552]: time="2025-05-17T00:34:47Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:34:47.608818 /usr/lib/systemd/system-generators/torcx-generator[2552]: time="2025-05-17T00:34:47Z" level=info msg="torcx already run" May 17 00:34:47.698342 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:34:47.698370 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:34:47.718140 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:34:47.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.808000 audit: BPF prog-id=88 op=LOAD May 17 00:34:47.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.808000 audit: BPF prog-id=89 op=LOAD May 17 00:34:47.808000 audit: BPF prog-id=49 op=UNLOAD May 17 00:34:47.808000 audit: BPF prog-id=50 op=UNLOAD May 17 00:34:47.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.810000 audit: BPF prog-id=90 op=LOAD May 17 00:34:47.810000 audit: BPF prog-id=68 op=UNLOAD May 17 00:34:47.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.811000 audit: BPF prog-id=91 op=LOAD May 17 00:34:47.811000 audit: BPF prog-id=51 op=UNLOAD May 17 00:34:47.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.813000 audit: BPF prog-id=92 op=LOAD May 17 00:34:47.813000 audit: BPF prog-id=64 op=UNLOAD May 17 00:34:47.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.814000 audit: BPF prog-id=93 op=LOAD May 17 00:34:47.814000 audit: BPF prog-id=84 op=UNLOAD May 17 00:34:47.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.815000 audit: BPF prog-id=94 op=LOAD May 17 00:34:47.815000 audit: BPF prog-id=52 op=UNLOAD May 17 00:34:47.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.817000 audit: BPF prog-id=95 op=LOAD May 17 00:34:47.817000 audit: BPF prog-id=72 op=UNLOAD May 17 00:34:47.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.819000 audit: BPF prog-id=96 op=LOAD May 17 00:34:47.819000 audit: BPF prog-id=53 op=UNLOAD May 17 00:34:47.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.820000 audit: BPF prog-id=97 op=LOAD May 17 00:34:47.820000 audit: BPF prog-id=54 op=UNLOAD May 17 00:34:47.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.820000 audit: BPF prog-id=98 op=LOAD May 17 00:34:47.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.820000 audit: BPF prog-id=99 op=LOAD May 17 00:34:47.820000 audit: BPF prog-id=55 op=UNLOAD May 17 00:34:47.820000 audit: BPF prog-id=56 op=UNLOAD May 17 00:34:47.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.822000 audit: BPF prog-id=100 op=LOAD May 17 00:34:47.822000 audit: BPF prog-id=76 op=UNLOAD May 17 00:34:47.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.824000 audit: BPF prog-id=101 op=LOAD May 17 00:34:47.824000 audit: BPF prog-id=57 op=UNLOAD May 17 00:34:47.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.824000 audit: BPF prog-id=102 op=LOAD May 17 00:34:47.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.825000 audit: BPF prog-id=103 op=LOAD May 17 00:34:47.825000 audit: BPF prog-id=58 op=UNLOAD May 17 00:34:47.825000 audit: BPF prog-id=59 op=UNLOAD May 17 00:34:47.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.826000 audit: BPF prog-id=104 op=LOAD May 17 00:34:47.826000 audit: BPF prog-id=60 op=UNLOAD May 17 00:34:47.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.826000 audit: BPF prog-id=105 op=LOAD May 17 00:34:47.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.826000 audit: BPF prog-id=106 op=LOAD May 17 00:34:47.826000 audit: BPF prog-id=61 op=UNLOAD May 17 00:34:47.826000 audit: BPF prog-id=62 op=UNLOAD May 17 00:34:47.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.827000 audit: BPF prog-id=107 op=LOAD May 17 00:34:47.827000 audit: BPF prog-id=63 op=UNLOAD May 17 00:34:47.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:47.828000 audit: BPF prog-id=108 op=LOAD May 17 00:34:47.828000 audit: BPF prog-id=80 op=UNLOAD May 17 00:34:47.847284 systemd[1]: Stopping kubelet.service... May 17 00:34:47.875204 systemd[1]: kubelet.service: Deactivated successfully. May 17 00:34:47.875414 systemd[1]: Stopped kubelet.service. May 17 00:34:47.874000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:47.877502 systemd[1]: Starting kubelet.service... May 17 00:34:49.598066 systemd[1]: Started kubelet.service. May 17 00:34:49.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:49.681589 kubelet[2612]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:34:49.681589 kubelet[2612]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 17 00:34:49.681589 kubelet[2612]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:34:49.684297 kubelet[2612]: I0517 00:34:49.684235 2612 server.go:211] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 17 00:34:49.696734 kubelet[2612]: I0517 00:34:49.695175 2612 server.go:491] "Kubelet version" kubeletVersion="v1.31.8" May 17 00:34:49.696734 kubelet[2612]: I0517 00:34:49.695209 2612 server.go:493] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 17 00:34:49.696734 kubelet[2612]: I0517 00:34:49.695670 2612 server.go:934] "Client rotation is on, will bootstrap in background" May 17 00:34:49.702130 kubelet[2612]: I0517 00:34:49.702096 2612 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 17 00:34:49.709548 kubelet[2612]: I0517 00:34:49.709514 2612 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 00:34:49.716881 kubelet[2612]: E0517 00:34:49.716847 2612 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 17 00:34:49.716881 kubelet[2612]: I0517 00:34:49.716879 2612 server.go:1408] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 17 00:34:49.719076 kubelet[2612]: I0517 00:34:49.719048 2612 server.go:749] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 17 00:34:49.719194 kubelet[2612]: I0517 00:34:49.719140 2612 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 17 00:34:49.719274 kubelet[2612]: I0517 00:34:49.719247 2612 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 17 00:34:49.719456 kubelet[2612]: I0517 00:34:49.719275 2612 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ip-172-31-29-247","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 17 00:34:49.719569 kubelet[2612]: I0517 00:34:49.719466 2612 topology_manager.go:138] "Creating topology manager with none policy" May 17 00:34:49.719569 kubelet[2612]: I0517 00:34:49.719475 2612 container_manager_linux.go:300] "Creating device plugin manager" May 17 00:34:49.719569 kubelet[2612]: I0517 00:34:49.719498 2612 state_mem.go:36] "Initialized new in-memory state store" May 17 00:34:49.719653 kubelet[2612]: I0517 00:34:49.719603 2612 kubelet.go:408] "Attempting to sync node with API server" May 17 00:34:49.719653 kubelet[2612]: I0517 00:34:49.719613 2612 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 17 00:34:49.719653 kubelet[2612]: I0517 00:34:49.719635 2612 kubelet.go:314] "Adding apiserver pod source" May 17 00:34:49.719653 kubelet[2612]: I0517 00:34:49.719644 2612 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 17 00:34:49.727840 kubelet[2612]: I0517 00:34:49.727814 2612 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 17 00:34:49.728229 kubelet[2612]: I0517 00:34:49.728214 2612 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 17 00:34:49.728682 kubelet[2612]: I0517 00:34:49.728666 2612 server.go:1274] "Started kubelet" May 17 00:34:49.729720 kubelet[2612]: I0517 00:34:49.729683 2612 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 17 00:34:49.732650 kubelet[2612]: I0517 00:34:49.732610 2612 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 17 00:34:49.732941 kubelet[2612]: I0517 00:34:49.732924 2612 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 17 00:34:49.740891 kubelet[2612]: I0517 00:34:49.740852 2612 server.go:449] "Adding debug handlers to kubelet server" May 17 00:34:49.765000 audit[2612]: AVC avc: denied { mac_admin } for pid=2612 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:49.765000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:34:49.765000 audit[2612]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d516b0 a1=c000a21cc8 a2=c000d51680 a3=25 items=0 ppid=1 pid=2612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:49.765000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:34:49.774055 kubelet[2612]: E0517 00:34:49.774030 2612 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 17 00:34:49.774474 kubelet[2612]: I0517 00:34:49.774450 2612 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 17 00:34:49.773000 audit[2612]: AVC avc: denied { mac_admin } for pid=2612 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:49.773000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:34:49.773000 audit[2612]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009665a0 a1=c000a202a0 a2=c000d51e60 a3=25 items=0 ppid=1 pid=2612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:49.773000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:34:49.776129 kubelet[2612]: I0517 00:34:49.776107 2612 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 17 00:34:49.776239 kubelet[2612]: I0517 00:34:49.776230 2612 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 17 00:34:49.776687 kubelet[2612]: I0517 00:34:49.776666 2612 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 17 00:34:49.782288 kubelet[2612]: I0517 00:34:49.782264 2612 volume_manager.go:289] "Starting Kubelet Volume Manager" May 17 00:34:49.782603 kubelet[2612]: I0517 00:34:49.782579 2612 desired_state_of_world_populator.go:147] "Desired state populator starts to run" May 17 00:34:49.782856 kubelet[2612]: I0517 00:34:49.782843 2612 reconciler.go:26] "Reconciler: start to sync state" May 17 00:34:49.788816 kubelet[2612]: I0517 00:34:49.788785 2612 factory.go:221] Registration of the systemd container factory successfully May 17 00:34:49.790443 kubelet[2612]: I0517 00:34:49.790414 2612 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 17 00:34:49.794319 kubelet[2612]: I0517 00:34:49.794295 2612 factory.go:221] Registration of the containerd container factory successfully May 17 00:34:49.811536 kubelet[2612]: I0517 00:34:49.811479 2612 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 17 00:34:49.815116 kubelet[2612]: I0517 00:34:49.815083 2612 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 17 00:34:49.815377 kubelet[2612]: I0517 00:34:49.815360 2612 status_manager.go:217] "Starting to sync pod status with apiserver" May 17 00:34:49.816847 kubelet[2612]: I0517 00:34:49.816816 2612 kubelet.go:2321] "Starting kubelet main sync loop" May 17 00:34:49.816983 kubelet[2612]: E0517 00:34:49.816899 2612 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 17 00:34:49.887641 kubelet[2612]: I0517 00:34:49.884698 2612 cpu_manager.go:214] "Starting CPU manager" policy="none" May 17 00:34:49.887877 kubelet[2612]: I0517 00:34:49.887853 2612 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 17 00:34:49.887976 kubelet[2612]: I0517 00:34:49.887967 2612 state_mem.go:36] "Initialized new in-memory state store" May 17 00:34:49.888292 kubelet[2612]: I0517 00:34:49.888274 2612 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 17 00:34:49.888444 kubelet[2612]: I0517 00:34:49.888411 2612 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 17 00:34:49.888526 kubelet[2612]: I0517 00:34:49.888519 2612 policy_none.go:49] "None policy: Start" May 17 00:34:49.892948 kubelet[2612]: I0517 00:34:49.892099 2612 memory_manager.go:170] "Starting memorymanager" policy="None" May 17 00:34:49.892948 kubelet[2612]: I0517 00:34:49.892136 2612 state_mem.go:35] "Initializing new in-memory state store" May 17 00:34:49.892948 kubelet[2612]: I0517 00:34:49.892364 2612 state_mem.go:75] "Updated machine memory state" May 17 00:34:49.918010 kubelet[2612]: E0517 00:34:49.917968 2612 kubelet.go:2345] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 17 00:34:49.926322 kubelet[2612]: I0517 00:34:49.926289 2612 manager.go:513] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 17 00:34:49.925000 audit[2612]: AVC avc: denied { mac_admin } for pid=2612 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:49.925000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:34:49.925000 audit[2612]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ff88d0 a1=c00102bea8 a2=c000ff88a0 a3=25 items=0 ppid=1 pid=2612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:49.925000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:34:49.926917 kubelet[2612]: I0517 00:34:49.926368 2612 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 17 00:34:49.926917 kubelet[2612]: I0517 00:34:49.926518 2612 eviction_manager.go:189] "Eviction manager: starting control loop" May 17 00:34:49.926917 kubelet[2612]: I0517 00:34:49.926527 2612 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 17 00:34:49.928632 kubelet[2612]: I0517 00:34:49.928585 2612 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 17 00:34:50.050231 kubelet[2612]: I0517 00:34:50.050174 2612 kubelet_node_status.go:72] "Attempting to register node" node="ip-172-31-29-247" May 17 00:34:50.071950 kubelet[2612]: I0517 00:34:50.071913 2612 kubelet_node_status.go:111] "Node was previously registered" node="ip-172-31-29-247" May 17 00:34:50.072131 kubelet[2612]: I0517 00:34:50.072012 2612 kubelet_node_status.go:75] "Successfully registered node" node="ip-172-31-29-247" May 17 00:34:50.132103 kubelet[2612]: E0517 00:34:50.132067 2612 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ip-172-31-29-247\" already exists" pod="kube-system/kube-apiserver-ip-172-31-29-247" May 17 00:34:50.185327 kubelet[2612]: I0517 00:34:50.185290 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/f11fa25da144b5c82e6e2b90bc8e5405-ca-certs\") pod \"kube-apiserver-ip-172-31-29-247\" (UID: \"f11fa25da144b5c82e6e2b90bc8e5405\") " pod="kube-system/kube-apiserver-ip-172-31-29-247" May 17 00:34:50.185327 kubelet[2612]: I0517 00:34:50.185327 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/f11fa25da144b5c82e6e2b90bc8e5405-k8s-certs\") pod \"kube-apiserver-ip-172-31-29-247\" (UID: \"f11fa25da144b5c82e6e2b90bc8e5405\") " pod="kube-system/kube-apiserver-ip-172-31-29-247" May 17 00:34:50.185528 kubelet[2612]: I0517 00:34:50.185353 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/af70725db32c89120090cb6e46ebce95-k8s-certs\") pod \"kube-controller-manager-ip-172-31-29-247\" (UID: \"af70725db32c89120090cb6e46ebce95\") " pod="kube-system/kube-controller-manager-ip-172-31-29-247" May 17 00:34:50.185528 kubelet[2612]: I0517 00:34:50.185371 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/af70725db32c89120090cb6e46ebce95-kubeconfig\") pod \"kube-controller-manager-ip-172-31-29-247\" (UID: \"af70725db32c89120090cb6e46ebce95\") " pod="kube-system/kube-controller-manager-ip-172-31-29-247" May 17 00:34:50.185528 kubelet[2612]: I0517 00:34:50.185399 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/af70725db32c89120090cb6e46ebce95-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-29-247\" (UID: \"af70725db32c89120090cb6e46ebce95\") " pod="kube-system/kube-controller-manager-ip-172-31-29-247" May 17 00:34:50.185528 kubelet[2612]: I0517 00:34:50.185418 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/77ebb9481f96b404ba85b6921c799a22-kubeconfig\") pod \"kube-scheduler-ip-172-31-29-247\" (UID: \"77ebb9481f96b404ba85b6921c799a22\") " pod="kube-system/kube-scheduler-ip-172-31-29-247" May 17 00:34:50.185528 kubelet[2612]: I0517 00:34:50.185435 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/af70725db32c89120090cb6e46ebce95-ca-certs\") pod \"kube-controller-manager-ip-172-31-29-247\" (UID: \"af70725db32c89120090cb6e46ebce95\") " pod="kube-system/kube-controller-manager-ip-172-31-29-247" May 17 00:34:50.185675 kubelet[2612]: I0517 00:34:50.185449 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/af70725db32c89120090cb6e46ebce95-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-29-247\" (UID: \"af70725db32c89120090cb6e46ebce95\") " pod="kube-system/kube-controller-manager-ip-172-31-29-247" May 17 00:34:50.185675 kubelet[2612]: I0517 00:34:50.185471 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/f11fa25da144b5c82e6e2b90bc8e5405-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-29-247\" (UID: \"f11fa25da144b5c82e6e2b90bc8e5405\") " pod="kube-system/kube-apiserver-ip-172-31-29-247" May 17 00:34:50.727051 kubelet[2612]: I0517 00:34:50.727004 2612 apiserver.go:52] "Watching apiserver" May 17 00:34:50.783146 kubelet[2612]: I0517 00:34:50.783113 2612 desired_state_of_world_populator.go:155] "Finished populating initial desired state of world" May 17 00:34:50.875287 kubelet[2612]: E0517 00:34:50.875234 2612 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ip-172-31-29-247\" already exists" pod="kube-system/kube-apiserver-ip-172-31-29-247" May 17 00:34:50.915630 kubelet[2612]: I0517 00:34:50.915554 2612 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ip-172-31-29-247" podStartSLOduration=4.915532171 podStartE2EDuration="4.915532171s" podCreationTimestamp="2025-05-17 00:34:46 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:34:50.91350838 +0000 UTC m=+1.299400707" watchObservedRunningTime="2025-05-17 00:34:50.915532171 +0000 UTC m=+1.301424492" May 17 00:34:50.915838 kubelet[2612]: I0517 00:34:50.915741 2612 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ip-172-31-29-247" podStartSLOduration=0.91573198 podStartE2EDuration="915.73198ms" podCreationTimestamp="2025-05-17 00:34:50 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:34:50.903195708 +0000 UTC m=+1.289088049" watchObservedRunningTime="2025-05-17 00:34:50.91573198 +0000 UTC m=+1.301624309" May 17 00:34:50.943921 kubelet[2612]: I0517 00:34:50.943842 2612 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ip-172-31-29-247" podStartSLOduration=0.943822465 podStartE2EDuration="943.822465ms" podCreationTimestamp="2025-05-17 00:34:50 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:34:50.930085542 +0000 UTC m=+1.315977872" watchObservedRunningTime="2025-05-17 00:34:50.943822465 +0000 UTC m=+1.329714801" May 17 00:34:51.554722 update_engine[1729]: I0517 00:34:51.554622 1729 update_attempter.cc:509] Updating boot flags... May 17 00:34:51.608849 kernel: kauditd_printk_skb: 266 callbacks suppressed May 17 00:34:51.609122 kernel: audit: type=1400 audit(1747442091.604:826): avc: denied { watch } for pid=2468 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 17 00:34:51.604000 audit[2468]: AVC avc: denied { watch } for pid=2468 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 17 00:34:51.604000 audit[2468]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000e45080 a2=fc6 a3=0 items=0 ppid=2314 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 key=(null) May 17 00:34:51.630773 kernel: audit: type=1300 audit(1747442091.604:826): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000e45080 a2=fc6 a3=0 items=0 ppid=2314 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 key=(null) May 17 00:34:51.604000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:34:51.644823 kernel: audit: type=1327 audit(1747442091.604:826): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:34:52.752000 audit[2468]: AVC avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:52.752000 audit[2468]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001545040 a2=fc6 a3=0 items=0 ppid=2314 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 key=(null) May 17 00:34:52.769093 kernel: audit: type=1400 audit(1747442092.752:827): avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:52.769240 kernel: audit: type=1300 audit(1747442092.752:827): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001545040 a2=fc6 a3=0 items=0 ppid=2314 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 key=(null) May 17 00:34:52.752000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:34:52.776933 kernel: audit: type=1327 audit(1747442092.752:827): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:34:52.754000 audit[2468]: AVC avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:52.783802 kernel: audit: type=1400 audit(1747442092.754:828): avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:52.783947 kernel: audit: type=1300 audit(1747442092.754:828): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001597760 a2=fc6 a3=0 items=0 ppid=2314 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 key=(null) May 17 00:34:52.754000 audit[2468]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001597760 a2=fc6 a3=0 items=0 ppid=2314 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 key=(null) May 17 00:34:52.754000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:34:52.798518 kernel: audit: type=1327 audit(1747442092.754:828): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:34:52.798637 kernel: audit: type=1400 audit(1747442092.755:829): avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:52.755000 audit[2468]: AVC avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:52.755000 audit[2468]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001597780 a2=fc6 a3=0 items=0 ppid=2314 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 key=(null) May 17 00:34:52.755000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:34:52.755000 audit[2468]: AVC avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:52.755000 audit[2468]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0015977a0 a2=fc6 a3=0 items=0 ppid=2314 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 key=(null) May 17 00:34:52.755000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:34:54.011558 kubelet[2612]: I0517 00:34:54.011526 2612 kuberuntime_manager.go:1635] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 17 00:34:54.012987 env[1754]: time="2025-05-17T00:34:54.012835543Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 17 00:34:54.013624 kubelet[2612]: I0517 00:34:54.013601 2612 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 17 00:34:54.781182 systemd[1]: Created slice kubepods-besteffort-pod1aab4fb5_622f_4227_81ea_7be1d41153b2.slice. May 17 00:34:54.818015 kubelet[2612]: I0517 00:34:54.817971 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/1aab4fb5-622f-4227-81ea-7be1d41153b2-kube-proxy\") pod \"kube-proxy-6bngf\" (UID: \"1aab4fb5-622f-4227-81ea-7be1d41153b2\") " pod="kube-system/kube-proxy-6bngf" May 17 00:34:54.818015 kubelet[2612]: I0517 00:34:54.818009 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1aab4fb5-622f-4227-81ea-7be1d41153b2-lib-modules\") pod \"kube-proxy-6bngf\" (UID: \"1aab4fb5-622f-4227-81ea-7be1d41153b2\") " pod="kube-system/kube-proxy-6bngf" May 17 00:34:54.818450 kubelet[2612]: I0517 00:34:54.818045 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-q674b\" (UniqueName: \"kubernetes.io/projected/1aab4fb5-622f-4227-81ea-7be1d41153b2-kube-api-access-q674b\") pod \"kube-proxy-6bngf\" (UID: \"1aab4fb5-622f-4227-81ea-7be1d41153b2\") " pod="kube-system/kube-proxy-6bngf" May 17 00:34:54.818450 kubelet[2612]: I0517 00:34:54.818070 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1aab4fb5-622f-4227-81ea-7be1d41153b2-xtables-lock\") pod \"kube-proxy-6bngf\" (UID: \"1aab4fb5-622f-4227-81ea-7be1d41153b2\") " pod="kube-system/kube-proxy-6bngf" May 17 00:34:54.928559 kubelet[2612]: I0517 00:34:54.928520 2612 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 17 00:34:55.019253 kubelet[2612]: I0517 00:34:55.019222 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/4aac0aac-f1ce-4f32-a780-44df5a19ff8f-var-lib-calico\") pod \"tigera-operator-7c5755cdcb-4dn4r\" (UID: \"4aac0aac-f1ce-4f32-a780-44df5a19ff8f\") " pod="tigera-operator/tigera-operator-7c5755cdcb-4dn4r" May 17 00:34:55.019693 kubelet[2612]: I0517 00:34:55.019266 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-f57zp\" (UniqueName: \"kubernetes.io/projected/4aac0aac-f1ce-4f32-a780-44df5a19ff8f-kube-api-access-f57zp\") pod \"tigera-operator-7c5755cdcb-4dn4r\" (UID: \"4aac0aac-f1ce-4f32-a780-44df5a19ff8f\") " pod="tigera-operator/tigera-operator-7c5755cdcb-4dn4r" May 17 00:34:55.021963 systemd[1]: Created slice kubepods-besteffort-pod4aac0aac_f1ce_4f32_a780_44df5a19ff8f.slice. May 17 00:34:55.091682 env[1754]: time="2025-05-17T00:34:55.091564048Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-6bngf,Uid:1aab4fb5-622f-4227-81ea-7be1d41153b2,Namespace:kube-system,Attempt:0,}" May 17 00:34:55.130499 env[1754]: time="2025-05-17T00:34:55.130386555Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:34:55.130919 env[1754]: time="2025-05-17T00:34:55.130872509Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:34:55.131112 env[1754]: time="2025-05-17T00:34:55.131084338Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:34:55.131762 env[1754]: time="2025-05-17T00:34:55.131716026Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b12a27e19d4f2a28519a21bf44689f2dd17cd480669d84d32abe5f999eee027e pid=2931 runtime=io.containerd.runc.v2 May 17 00:34:55.168994 systemd[1]: Started cri-containerd-b12a27e19d4f2a28519a21bf44689f2dd17cd480669d84d32abe5f999eee027e.scope. May 17 00:34:55.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.191000 audit: BPF prog-id=109 op=LOAD May 17 00:34:55.192000 audit[2942]: AVC avc: denied { bpf } for pid=2942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.192000 audit[2942]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2931 pid=2942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:55.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231326132376531396434663261323835313961323162663434363839 May 17 00:34:55.192000 audit[2942]: AVC avc: denied { perfmon } for pid=2942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.192000 audit[2942]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2931 pid=2942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:55.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231326132376531396434663261323835313961323162663434363839 May 17 00:34:55.192000 audit[2942]: AVC avc: denied { bpf } for pid=2942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.192000 audit[2942]: AVC avc: denied { bpf } for pid=2942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.192000 audit[2942]: AVC avc: denied { bpf } for pid=2942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.192000 audit[2942]: AVC avc: denied { perfmon } for pid=2942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.192000 audit[2942]: AVC avc: denied { perfmon } for pid=2942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.192000 audit[2942]: AVC avc: denied { perfmon } for pid=2942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.192000 audit[2942]: AVC avc: denied { perfmon } for pid=2942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.192000 audit[2942]: AVC avc: denied { perfmon } for pid=2942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.192000 audit[2942]: AVC avc: denied { bpf } for pid=2942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.192000 audit[2942]: AVC avc: denied { bpf } for pid=2942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.192000 audit: BPF prog-id=110 op=LOAD May 17 00:34:55.192000 audit[2942]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00034a000 items=0 ppid=2931 pid=2942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:55.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231326132376531396434663261323835313961323162663434363839 May 17 00:34:55.192000 audit[2942]: AVC avc: denied { bpf } for pid=2942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.192000 audit[2942]: AVC avc: denied { bpf } for pid=2942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.192000 audit[2942]: AVC avc: denied { perfmon } for pid=2942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.192000 audit[2942]: AVC avc: denied { perfmon } for pid=2942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.192000 audit[2942]: AVC avc: denied { perfmon } for pid=2942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.192000 audit[2942]: AVC avc: denied { perfmon } for pid=2942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.192000 audit[2942]: AVC avc: denied { perfmon } for pid=2942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.192000 audit[2942]: AVC avc: denied { bpf } for pid=2942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.192000 audit[2942]: AVC avc: denied { bpf } for pid=2942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.192000 audit: BPF prog-id=111 op=LOAD May 17 00:34:55.192000 audit[2942]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00034a048 items=0 ppid=2931 pid=2942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:55.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231326132376531396434663261323835313961323162663434363839 May 17 00:34:55.192000 audit: BPF prog-id=111 op=UNLOAD May 17 00:34:55.192000 audit: BPF prog-id=110 op=UNLOAD May 17 00:34:55.192000 audit[2942]: AVC avc: denied { bpf } for pid=2942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.192000 audit[2942]: AVC avc: denied { bpf } for pid=2942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.192000 audit[2942]: AVC avc: denied { bpf } for pid=2942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.192000 audit[2942]: AVC avc: denied { perfmon } for pid=2942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.192000 audit[2942]: AVC avc: denied { perfmon } for pid=2942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.192000 audit[2942]: AVC avc: denied { perfmon } for pid=2942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.192000 audit[2942]: AVC avc: denied { perfmon } for pid=2942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.192000 audit[2942]: AVC avc: denied { perfmon } for pid=2942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.192000 audit[2942]: AVC avc: denied { bpf } for pid=2942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.192000 audit[2942]: AVC avc: denied { bpf } for pid=2942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.192000 audit: BPF prog-id=112 op=LOAD May 17 00:34:55.192000 audit[2942]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00034a458 items=0 ppid=2931 pid=2942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:55.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231326132376531396434663261323835313961323162663434363839 May 17 00:34:55.208944 env[1754]: time="2025-05-17T00:34:55.208892038Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-6bngf,Uid:1aab4fb5-622f-4227-81ea-7be1d41153b2,Namespace:kube-system,Attempt:0,} returns sandbox id \"b12a27e19d4f2a28519a21bf44689f2dd17cd480669d84d32abe5f999eee027e\"" May 17 00:34:55.214346 env[1754]: time="2025-05-17T00:34:55.214287748Z" level=info msg="CreateContainer within sandbox \"b12a27e19d4f2a28519a21bf44689f2dd17cd480669d84d32abe5f999eee027e\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 17 00:34:55.280788 env[1754]: time="2025-05-17T00:34:55.280691687Z" level=info msg="CreateContainer within sandbox \"b12a27e19d4f2a28519a21bf44689f2dd17cd480669d84d32abe5f999eee027e\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"756504a2694d63751e3747b8b08cd0f312006e6e06c31163b9add4c66e7b2ab0\"" May 17 00:34:55.281515 env[1754]: time="2025-05-17T00:34:55.281478787Z" level=info msg="StartContainer for \"756504a2694d63751e3747b8b08cd0f312006e6e06c31163b9add4c66e7b2ab0\"" May 17 00:34:55.304096 systemd[1]: Started cri-containerd-756504a2694d63751e3747b8b08cd0f312006e6e06c31163b9add4c66e7b2ab0.scope. May 17 00:34:55.327231 env[1754]: time="2025-05-17T00:34:55.327152259Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7c5755cdcb-4dn4r,Uid:4aac0aac-f1ce-4f32-a780-44df5a19ff8f,Namespace:tigera-operator,Attempt:0,}" May 17 00:34:55.330000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.330000 audit[2973]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f13042ecc38 items=0 ppid=2931 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:55.330000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735363530346132363934643633373531653337343762386230386364 May 17 00:34:55.330000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.330000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.330000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.330000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.330000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.330000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.330000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.330000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.330000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.330000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.330000 audit: BPF prog-id=113 op=LOAD May 17 00:34:55.330000 audit[2973]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00027dbc8 items=0 ppid=2931 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:55.330000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735363530346132363934643633373531653337343762386230386364 May 17 00:34:55.330000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.330000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.330000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.330000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.330000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.330000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.330000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.330000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.330000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.330000 audit: BPF prog-id=114 op=LOAD May 17 00:34:55.330000 audit[2973]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00027dc18 items=0 ppid=2931 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:55.330000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735363530346132363934643633373531653337343762386230386364 May 17 00:34:55.330000 audit: BPF prog-id=114 op=UNLOAD May 17 00:34:55.330000 audit: BPF prog-id=113 op=UNLOAD May 17 00:34:55.330000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.330000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.330000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.330000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.330000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.330000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.330000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.330000 audit[2973]: AVC avc: denied { perfmon } for pid=2973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.330000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.330000 audit[2973]: AVC avc: denied { bpf } for pid=2973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.330000 audit: BPF prog-id=115 op=LOAD May 17 00:34:55.330000 audit[2973]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c00027dca8 items=0 ppid=2931 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:55.330000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735363530346132363934643633373531653337343762386230386364 May 17 00:34:55.350067 env[1754]: time="2025-05-17T00:34:55.349916774Z" level=info msg="StartContainer for \"756504a2694d63751e3747b8b08cd0f312006e6e06c31163b9add4c66e7b2ab0\" returns successfully" May 17 00:34:55.363746 env[1754]: time="2025-05-17T00:34:55.363646843Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:34:55.364591 env[1754]: time="2025-05-17T00:34:55.364542786Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:34:55.364757 env[1754]: time="2025-05-17T00:34:55.364723926Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:34:55.365135 env[1754]: time="2025-05-17T00:34:55.365098897Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/524a956a3bb2fc05b5e9968cad912aea62baefe778265ccfe75f804a789a2cd5 pid=3002 runtime=io.containerd.runc.v2 May 17 00:34:55.381191 systemd[1]: Started cri-containerd-524a956a3bb2fc05b5e9968cad912aea62baefe778265ccfe75f804a789a2cd5.scope. May 17 00:34:55.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.399000 audit: BPF prog-id=116 op=LOAD May 17 00:34:55.400000 audit[3014]: AVC avc: denied { bpf } for pid=3014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.400000 audit[3014]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3002 pid=3014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:55.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532346139353661336262326663303562356539393638636164393132 May 17 00:34:55.400000 audit[3014]: AVC avc: denied { perfmon } for pid=3014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.400000 audit[3014]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3002 pid=3014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:55.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532346139353661336262326663303562356539393638636164393132 May 17 00:34:55.400000 audit[3014]: AVC avc: denied { bpf } for pid=3014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.400000 audit[3014]: AVC avc: denied { bpf } for pid=3014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.400000 audit[3014]: AVC avc: denied { bpf } for pid=3014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.400000 audit[3014]: AVC avc: denied { perfmon } for pid=3014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.400000 audit[3014]: AVC avc: denied { perfmon } for pid=3014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.400000 audit[3014]: AVC avc: denied { perfmon } for pid=3014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.400000 audit[3014]: AVC avc: denied { perfmon } for pid=3014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.400000 audit[3014]: AVC avc: denied { perfmon } for pid=3014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.400000 audit[3014]: AVC avc: denied { bpf } for pid=3014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.400000 audit[3014]: AVC avc: denied { bpf } for pid=3014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.400000 audit: BPF prog-id=117 op=LOAD May 17 00:34:55.400000 audit[3014]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000025080 items=0 ppid=3002 pid=3014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:55.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532346139353661336262326663303562356539393638636164393132 May 17 00:34:55.400000 audit[3014]: AVC avc: denied { bpf } for pid=3014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.400000 audit[3014]: AVC avc: denied { bpf } for pid=3014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.400000 audit[3014]: AVC avc: denied { perfmon } for pid=3014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.400000 audit[3014]: AVC avc: denied { perfmon } for pid=3014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.400000 audit[3014]: AVC avc: denied { perfmon } for pid=3014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.400000 audit[3014]: AVC avc: denied { perfmon } for pid=3014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.400000 audit[3014]: AVC avc: denied { perfmon } for pid=3014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.400000 audit[3014]: AVC avc: denied { bpf } for pid=3014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.400000 audit[3014]: AVC avc: denied { bpf } for pid=3014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.400000 audit: BPF prog-id=118 op=LOAD May 17 00:34:55.400000 audit[3014]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000250c8 items=0 ppid=3002 pid=3014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:55.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532346139353661336262326663303562356539393638636164393132 May 17 00:34:55.400000 audit: BPF prog-id=118 op=UNLOAD May 17 00:34:55.400000 audit: BPF prog-id=117 op=UNLOAD May 17 00:34:55.400000 audit[3014]: AVC avc: denied { bpf } for pid=3014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.400000 audit[3014]: AVC avc: denied { bpf } for pid=3014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.400000 audit[3014]: AVC avc: denied { bpf } for pid=3014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.400000 audit[3014]: AVC avc: denied { perfmon } for pid=3014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.400000 audit[3014]: AVC avc: denied { perfmon } for pid=3014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.400000 audit[3014]: AVC avc: denied { perfmon } for pid=3014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.400000 audit[3014]: AVC avc: denied { perfmon } for pid=3014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.400000 audit[3014]: AVC avc: denied { perfmon } for pid=3014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.400000 audit[3014]: AVC avc: denied { bpf } for pid=3014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.400000 audit[3014]: AVC avc: denied { bpf } for pid=3014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:55.400000 audit: BPF prog-id=119 op=LOAD May 17 00:34:55.400000 audit[3014]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000254d8 items=0 ppid=3002 pid=3014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:55.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532346139353661336262326663303562356539393638636164393132 May 17 00:34:55.432300 env[1754]: time="2025-05-17T00:34:55.432251996Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7c5755cdcb-4dn4r,Uid:4aac0aac-f1ce-4f32-a780-44df5a19ff8f,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"524a956a3bb2fc05b5e9968cad912aea62baefe778265ccfe75f804a789a2cd5\"" May 17 00:34:55.438483 env[1754]: time="2025-05-17T00:34:55.438443770Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.0\"" May 17 00:34:55.951117 systemd[1]: run-containerd-runc-k8s.io-b12a27e19d4f2a28519a21bf44689f2dd17cd480669d84d32abe5f999eee027e-runc.aPkFDN.mount: Deactivated successfully. May 17 00:34:56.920979 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount255805303.mount: Deactivated successfully. May 17 00:34:57.940868 env[1754]: time="2025-05-17T00:34:57.940814425Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.38.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:57.943819 env[1754]: time="2025-05-17T00:34:57.943775728Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5e43c1322619406528ff596056dfeb70cb8d20c5c00439feb752a7725302e033,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:57.945845 env[1754]: time="2025-05-17T00:34:57.945804232Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.38.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:57.947638 env[1754]: time="2025-05-17T00:34:57.947602749Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:e0a34b265aebce1a2db906d8dad99190706e8bf3910cae626b9c2eb6bbb21775,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:57.947980 env[1754]: time="2025-05-17T00:34:57.947949957Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.0\" returns image reference \"sha256:5e43c1322619406528ff596056dfeb70cb8d20c5c00439feb752a7725302e033\"" May 17 00:34:57.950260 env[1754]: time="2025-05-17T00:34:57.950233585Z" level=info msg="CreateContainer within sandbox \"524a956a3bb2fc05b5e9968cad912aea62baefe778265ccfe75f804a789a2cd5\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 17 00:34:57.960258 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2087779976.mount: Deactivated successfully. May 17 00:34:57.976126 env[1754]: time="2025-05-17T00:34:57.976074216Z" level=info msg="CreateContainer within sandbox \"524a956a3bb2fc05b5e9968cad912aea62baefe778265ccfe75f804a789a2cd5\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"ea8ae9aa3de5866d9d09d006a6a00dd39a925e8cb2d7e71f080c28de2dd724a0\"" May 17 00:34:57.978111 env[1754]: time="2025-05-17T00:34:57.976779975Z" level=info msg="StartContainer for \"ea8ae9aa3de5866d9d09d006a6a00dd39a925e8cb2d7e71f080c28de2dd724a0\"" May 17 00:34:58.009382 systemd[1]: Started cri-containerd-ea8ae9aa3de5866d9d09d006a6a00dd39a925e8cb2d7e71f080c28de2dd724a0.scope. May 17 00:34:58.032424 kernel: kauditd_printk_skb: 162 callbacks suppressed May 17 00:34:58.032553 kernel: audit: type=1400 audit(1747442098.028:873): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.043365 kernel: audit: type=1400 audit(1747442098.028:874): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.049546 kernel: audit: type=1400 audit(1747442098.028:875): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.062366 kernel: audit: type=1400 audit(1747442098.028:876): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.062511 kernel: audit: type=1400 audit(1747442098.028:877): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.070722 kernel: audit: type=1400 audit(1747442098.028:878): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.077803 kernel: audit: type=1400 audit(1747442098.028:879): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.092018 kernel: audit: type=1400 audit(1747442098.028:880): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.092163 kernel: audit: type=1400 audit(1747442098.028:881): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.098994 kernel: audit: type=1400 audit(1747442098.031:882): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.031000 audit: BPF prog-id=120 op=LOAD May 17 00:34:58.036000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.036000 audit[3047]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3002 pid=3047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:58.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561386165396161336465353836366439643039643030366136613030 May 17 00:34:58.036000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.036000 audit[3047]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3002 pid=3047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:58.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561386165396161336465353836366439643039643030366136613030 May 17 00:34:58.036000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.036000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.036000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.036000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.036000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.036000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.036000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.036000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.036000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.036000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.036000 audit: BPF prog-id=121 op=LOAD May 17 00:34:58.036000 audit[3047]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00038c9d0 items=0 ppid=3002 pid=3047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:58.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561386165396161336465353836366439643039643030366136613030 May 17 00:34:58.048000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.048000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.048000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.048000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.048000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.048000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.048000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.048000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.048000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.048000 audit: BPF prog-id=122 op=LOAD May 17 00:34:58.048000 audit[3047]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00038ca18 items=0 ppid=3002 pid=3047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:58.048000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561386165396161336465353836366439643039643030366136613030 May 17 00:34:58.061000 audit: BPF prog-id=122 op=UNLOAD May 17 00:34:58.061000 audit: BPF prog-id=121 op=UNLOAD May 17 00:34:58.061000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.061000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.061000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.061000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.061000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.061000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.061000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.061000 audit[3047]: AVC avc: denied { perfmon } for pid=3047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.061000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.061000 audit[3047]: AVC avc: denied { bpf } for pid=3047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:58.061000 audit: BPF prog-id=123 op=LOAD May 17 00:34:58.061000 audit[3047]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00038ce28 items=0 ppid=3002 pid=3047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:58.061000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561386165396161336465353836366439643039643030366136613030 May 17 00:34:58.108317 env[1754]: time="2025-05-17T00:34:58.108261963Z" level=info msg="StartContainer for \"ea8ae9aa3de5866d9d09d006a6a00dd39a925e8cb2d7e71f080c28de2dd724a0\" returns successfully" May 17 00:34:58.894866 kubelet[2612]: I0517 00:34:58.894507 2612 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-6bngf" podStartSLOduration=4.894486569 podStartE2EDuration="4.894486569s" podCreationTimestamp="2025-05-17 00:34:54 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:34:55.886287192 +0000 UTC m=+6.272179521" watchObservedRunningTime="2025-05-17 00:34:58.894486569 +0000 UTC m=+9.280378889" May 17 00:34:58.957984 systemd[1]: run-containerd-runc-k8s.io-ea8ae9aa3de5866d9d09d006a6a00dd39a925e8cb2d7e71f080c28de2dd724a0-runc.jrD6PW.mount: Deactivated successfully. May 17 00:34:59.429000 audit[3107]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=3107 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:59.429000 audit[3107]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffffab09720 a2=0 a3=7ffffab0970c items=0 ppid=2984 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.429000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:34:59.431000 audit[3108]: NETFILTER_CFG table=nat:39 family=10 entries=1 op=nft_register_chain pid=3108 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:59.431000 audit[3108]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff886316b0 a2=0 a3=7fff8863169c items=0 ppid=2984 pid=3108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.431000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:34:59.432000 audit[3109]: NETFILTER_CFG table=filter:40 family=10 entries=1 op=nft_register_chain pid=3109 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:59.432000 audit[3109]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdabad8a10 a2=0 a3=7ffdabad89fc items=0 ppid=2984 pid=3109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.432000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:34:59.433000 audit[3110]: NETFILTER_CFG table=mangle:41 family=2 entries=1 op=nft_register_chain pid=3110 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:59.433000 audit[3110]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeb467d600 a2=0 a3=7ffeb467d5ec items=0 ppid=2984 pid=3110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.433000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:34:59.435000 audit[3111]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=3111 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:59.435000 audit[3111]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc42c2d4f0 a2=0 a3=7ffc42c2d4dc items=0 ppid=2984 pid=3111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.435000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:34:59.436000 audit[3112]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=3112 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:59.436000 audit[3112]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff466c9940 a2=0 a3=7fff466c992c items=0 ppid=2984 pid=3112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.436000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:34:59.541000 audit[3113]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=3113 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:59.541000 audit[3113]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff91a499a0 a2=0 a3=7fff91a4998c items=0 ppid=2984 pid=3113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.541000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:34:59.547000 audit[3115]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=3115 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:59.547000 audit[3115]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff28081930 a2=0 a3=7fff2808191c items=0 ppid=2984 pid=3115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.547000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 17 00:34:59.553000 audit[3118]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=3118 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:59.553000 audit[3118]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd619ad730 a2=0 a3=7ffd619ad71c items=0 ppid=2984 pid=3118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.553000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 17 00:34:59.554000 audit[3119]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=3119 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:59.554000 audit[3119]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc03a03850 a2=0 a3=7ffc03a0383c items=0 ppid=2984 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.554000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:34:59.557000 audit[3121]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=3121 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:59.557000 audit[3121]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd959d10d0 a2=0 a3=7ffd959d10bc items=0 ppid=2984 pid=3121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.557000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:34:59.559000 audit[3122]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=3122 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:59.559000 audit[3122]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffff5f75d70 a2=0 a3=7ffff5f75d5c items=0 ppid=2984 pid=3122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.559000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:34:59.572000 audit[3124]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=3124 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:59.572000 audit[3124]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffeedbafd70 a2=0 a3=7ffeedbafd5c items=0 ppid=2984 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.572000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:34:59.601000 audit[3127]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=3127 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:59.601000 audit[3127]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff3ae021c0 a2=0 a3=7fff3ae021ac items=0 ppid=2984 pid=3127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.601000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 17 00:34:59.604000 audit[3128]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=3128 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:59.604000 audit[3128]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe7a134ef0 a2=0 a3=7ffe7a134edc items=0 ppid=2984 pid=3128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.604000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:34:59.609000 audit[3130]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=3130 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:59.609000 audit[3130]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd6ec9d600 a2=0 a3=7ffd6ec9d5ec items=0 ppid=2984 pid=3130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.609000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:34:59.610000 audit[3131]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=3131 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:59.610000 audit[3131]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd23db5360 a2=0 a3=7ffd23db534c items=0 ppid=2984 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.610000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:34:59.613000 audit[3133]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=3133 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:59.613000 audit[3133]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe5865c1b0 a2=0 a3=7ffe5865c19c items=0 ppid=2984 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.613000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:34:59.619000 audit[3136]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=3136 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:59.619000 audit[3136]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd479d0f90 a2=0 a3=7ffd479d0f7c items=0 ppid=2984 pid=3136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.619000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:34:59.624000 audit[3139]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=3139 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:59.624000 audit[3139]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd8833b190 a2=0 a3=7ffd8833b17c items=0 ppid=2984 pid=3139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.624000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:34:59.626000 audit[3140]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=3140 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:59.626000 audit[3140]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe1b833670 a2=0 a3=7ffe1b83365c items=0 ppid=2984 pid=3140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.626000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:34:59.630000 audit[3142]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=3142 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:59.630000 audit[3142]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffeed85bf90 a2=0 a3=7ffeed85bf7c items=0 ppid=2984 pid=3142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.630000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:34:59.634000 audit[3145]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=3145 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:59.634000 audit[3145]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffcafab770 a2=0 a3=7fffcafab75c items=0 ppid=2984 pid=3145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.634000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:34:59.635000 audit[3146]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=3146 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:59.635000 audit[3146]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe05f07d80 a2=0 a3=7ffe05f07d6c items=0 ppid=2984 pid=3146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.635000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:34:59.638000 audit[3148]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=3148 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:59.638000 audit[3148]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffdb47f1750 a2=0 a3=7ffdb47f173c items=0 ppid=2984 pid=3148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.638000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:34:59.672000 audit[3154]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=3154 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:59.672000 audit[3154]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffcfcfad360 a2=0 a3=7ffcfcfad34c items=0 ppid=2984 pid=3154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.672000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:59.683000 audit[3154]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=3154 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:59.683000 audit[3154]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffcfcfad360 a2=0 a3=7ffcfcfad34c items=0 ppid=2984 pid=3154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.683000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:59.685000 audit[3159]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=3159 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:59.685000 audit[3159]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd16b731c0 a2=0 a3=7ffd16b731ac items=0 ppid=2984 pid=3159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.685000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:34:59.688000 audit[3162]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=3162 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:59.688000 audit[3162]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdd7584e00 a2=0 a3=7ffdd7584dec items=0 ppid=2984 pid=3162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.688000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 17 00:34:59.693000 audit[3165]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=3165 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:59.693000 audit[3165]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff54654340 a2=0 a3=7fff5465432c items=0 ppid=2984 pid=3165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.693000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 17 00:34:59.694000 audit[3166]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=3166 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:59.694000 audit[3166]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc7cf8b240 a2=0 a3=7ffc7cf8b22c items=0 ppid=2984 pid=3166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.694000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:34:59.698000 audit[3168]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=3168 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:59.698000 audit[3168]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe1ba8bb80 a2=0 a3=7ffe1ba8bb6c items=0 ppid=2984 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.698000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:34:59.699000 audit[3169]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=3169 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:59.699000 audit[3169]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd4e0dd880 a2=0 a3=7ffd4e0dd86c items=0 ppid=2984 pid=3169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.699000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:34:59.702000 audit[3171]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=3171 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:59.702000 audit[3171]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff331d6690 a2=0 a3=7fff331d667c items=0 ppid=2984 pid=3171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.702000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 17 00:34:59.707000 audit[3174]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=3174 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:59.707000 audit[3174]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff21b55210 a2=0 a3=7fff21b551fc items=0 ppid=2984 pid=3174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.707000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:34:59.708000 audit[3175]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=3175 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:59.708000 audit[3175]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffed1f10a00 a2=0 a3=7ffed1f109ec items=0 ppid=2984 pid=3175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.708000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:34:59.711000 audit[3177]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=3177 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:59.711000 audit[3177]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe5b0f54b0 a2=0 a3=7ffe5b0f549c items=0 ppid=2984 pid=3177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.711000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:34:59.713000 audit[3178]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=3178 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:59.713000 audit[3178]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffccedf6af0 a2=0 a3=7ffccedf6adc items=0 ppid=2984 pid=3178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.713000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:34:59.716000 audit[3180]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=3180 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:59.716000 audit[3180]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcae42a4f0 a2=0 a3=7ffcae42a4dc items=0 ppid=2984 pid=3180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.716000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:34:59.720000 audit[3183]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=3183 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:59.720000 audit[3183]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffe8e23a80 a2=0 a3=7fffe8e23a6c items=0 ppid=2984 pid=3183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.720000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:34:59.725000 audit[3186]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=3186 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:59.725000 audit[3186]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe018e94b0 a2=0 a3=7ffe018e949c items=0 ppid=2984 pid=3186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.725000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 17 00:34:59.727000 audit[3187]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=3187 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:59.727000 audit[3187]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff5bfc9b30 a2=0 a3=7fff5bfc9b1c items=0 ppid=2984 pid=3187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.727000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:34:59.730000 audit[3189]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=3189 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:59.730000 audit[3189]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffcc858c470 a2=0 a3=7ffcc858c45c items=0 ppid=2984 pid=3189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.730000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:34:59.734000 audit[3192]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=3192 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:59.734000 audit[3192]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe40310600 a2=0 a3=7ffe403105ec items=0 ppid=2984 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.734000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:34:59.735000 audit[3193]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=3193 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:59.735000 audit[3193]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffde54abfe0 a2=0 a3=7ffde54abfcc items=0 ppid=2984 pid=3193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.735000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:34:59.738000 audit[3195]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=3195 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:59.738000 audit[3195]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc461a7760 a2=0 a3=7ffc461a774c items=0 ppid=2984 pid=3195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.738000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:34:59.739000 audit[3196]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=3196 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:59.739000 audit[3196]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffffd377190 a2=0 a3=7ffffd37717c items=0 ppid=2984 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.739000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:34:59.742000 audit[3198]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=3198 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:59.742000 audit[3198]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff20c8dc70 a2=0 a3=7fff20c8dc5c items=0 ppid=2984 pid=3198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.742000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:34:59.746000 audit[3201]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=3201 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:34:59.746000 audit[3201]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd85148820 a2=0 a3=7ffd8514880c items=0 ppid=2984 pid=3201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.746000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:34:59.750000 audit[3203]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=3203 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:34:59.750000 audit[3203]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffdd1144190 a2=0 a3=7ffdd114417c items=0 ppid=2984 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.750000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:59.750000 audit[3203]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=3203 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:34:59.750000 audit[3203]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffdd1144190 a2=0 a3=7ffdd114417c items=0 ppid=2984 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.750000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:59.830809 kubelet[2612]: I0517 00:34:59.830746 2612 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7c5755cdcb-4dn4r" podStartSLOduration=3.315732994 podStartE2EDuration="5.830698293s" podCreationTimestamp="2025-05-17 00:34:54 +0000 UTC" firstStartedPulling="2025-05-17 00:34:55.434099131 +0000 UTC m=+5.819991438" lastFinishedPulling="2025-05-17 00:34:57.94906443 +0000 UTC m=+8.334956737" observedRunningTime="2025-05-17 00:34:58.896064616 +0000 UTC m=+9.281956941" watchObservedRunningTime="2025-05-17 00:34:59.830698293 +0000 UTC m=+10.216590621" May 17 00:35:36.291000 audit[2005]: USER_END pid=2005 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:35:36.292605 sudo[2005]: pam_unix(sudo:session): session closed for user root May 17 00:35:36.294906 kernel: kauditd_printk_skb: 200 callbacks suppressed May 17 00:35:36.295029 kernel: audit: type=1106 audit(1747442136.291:942): pid=2005 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:35:36.292000 audit[2005]: CRED_DISP pid=2005 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:35:36.311725 kernel: audit: type=1104 audit(1747442136.292:943): pid=2005 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:35:36.326949 sshd[2002]: pam_unix(sshd:session): session closed for user core May 17 00:35:36.332000 audit[2002]: USER_END pid=2002 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:35:36.341333 systemd[1]: sshd@6-172.31.29.247:22-139.178.68.195:55856.service: Deactivated successfully. May 17 00:35:36.342268 systemd[1]: session-7.scope: Deactivated successfully. May 17 00:35:36.342452 systemd[1]: session-7.scope: Consumed 5.313s CPU time. May 17 00:35:36.342729 kernel: audit: type=1106 audit(1747442136.332:944): pid=2002 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:35:36.344203 systemd-logind[1728]: Session 7 logged out. Waiting for processes to exit. May 17 00:35:36.332000 audit[2002]: CRED_DISP pid=2002 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:35:36.346240 systemd-logind[1728]: Removed session 7. May 17 00:35:36.352892 kernel: audit: type=1104 audit(1747442136.332:945): pid=2002 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:35:36.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.29.247:22-139.178.68.195:55856 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:36.364732 kernel: audit: type=1131 audit(1747442136.340:946): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.29.247:22-139.178.68.195:55856 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:37.569000 audit[3263]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=3263 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:37.586396 kernel: audit: type=1325 audit(1747442137.569:947): table=filter:89 family=2 entries=15 op=nft_register_rule pid=3263 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:37.586532 kernel: audit: type=1300 audit(1747442137.569:947): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fff4654f3f0 a2=0 a3=7fff4654f3dc items=0 ppid=2984 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:37.569000 audit[3263]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fff4654f3f0 a2=0 a3=7fff4654f3dc items=0 ppid=2984 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:37.569000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:37.593281 kernel: audit: type=1327 audit(1747442137.569:947): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:37.596000 audit[3263]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=3263 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:37.611734 kernel: audit: type=1325 audit(1747442137.596:948): table=nat:90 family=2 entries=12 op=nft_register_rule pid=3263 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:37.611885 kernel: audit: type=1300 audit(1747442137.596:948): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff4654f3f0 a2=0 a3=0 items=0 ppid=2984 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:37.596000 audit[3263]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff4654f3f0 a2=0 a3=0 items=0 ppid=2984 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:37.596000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:37.775000 audit[3265]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=3265 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:37.775000 audit[3265]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffdf0421030 a2=0 a3=7ffdf042101c items=0 ppid=2984 pid=3265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:37.775000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:37.779000 audit[3265]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=3265 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:37.779000 audit[3265]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdf0421030 a2=0 a3=0 items=0 ppid=2984 pid=3265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:37.779000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:40.723000 audit[3267]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=3267 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:40.723000 audit[3267]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffe0be1bb60 a2=0 a3=7ffe0be1bb4c items=0 ppid=2984 pid=3267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:40.723000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:40.729000 audit[3267]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=3267 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:40.729000 audit[3267]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe0be1bb60 a2=0 a3=0 items=0 ppid=2984 pid=3267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:40.729000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:40.751000 audit[3269]: NETFILTER_CFG table=filter:95 family=2 entries=18 op=nft_register_rule pid=3269 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:40.751000 audit[3269]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffef2dcb380 a2=0 a3=7ffef2dcb36c items=0 ppid=2984 pid=3269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:40.751000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:40.755000 audit[3269]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=3269 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:40.755000 audit[3269]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffef2dcb380 a2=0 a3=0 items=0 ppid=2984 pid=3269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:40.755000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:41.184904 systemd[1]: Created slice kubepods-besteffort-podf56a86e6_c008_4f94_9080_864264191baa.slice. May 17 00:35:41.377619 kubelet[2612]: I0517 00:35:41.377554 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/f56a86e6-c008-4f94-9080-864264191baa-typha-certs\") pod \"calico-typha-5fd64f6478-74lvz\" (UID: \"f56a86e6-c008-4f94-9080-864264191baa\") " pod="calico-system/calico-typha-5fd64f6478-74lvz" May 17 00:35:41.377619 kubelet[2612]: I0517 00:35:41.377621 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9tw5t\" (UniqueName: \"kubernetes.io/projected/f56a86e6-c008-4f94-9080-864264191baa-kube-api-access-9tw5t\") pod \"calico-typha-5fd64f6478-74lvz\" (UID: \"f56a86e6-c008-4f94-9080-864264191baa\") " pod="calico-system/calico-typha-5fd64f6478-74lvz" May 17 00:35:41.378135 kubelet[2612]: I0517 00:35:41.377667 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f56a86e6-c008-4f94-9080-864264191baa-tigera-ca-bundle\") pod \"calico-typha-5fd64f6478-74lvz\" (UID: \"f56a86e6-c008-4f94-9080-864264191baa\") " pod="calico-system/calico-typha-5fd64f6478-74lvz" May 17 00:35:41.531579 kubelet[2612]: W0517 00:35:41.531479 2612 reflector.go:561] object-"calico-system"/"node-certs": failed to list *v1.Secret: secrets "node-certs" is forbidden: User "system:node:ip-172-31-29-247" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ip-172-31-29-247' and this object May 17 00:35:41.531780 kubelet[2612]: E0517 00:35:41.531759 2612 reflector.go:158] "Unhandled Error" err="object-\"calico-system\"/\"node-certs\": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets \"node-certs\" is forbidden: User \"system:node:ip-172-31-29-247\" cannot list resource \"secrets\" in API group \"\" in the namespace \"calico-system\": no relationship found between node 'ip-172-31-29-247' and this object" logger="UnhandledError" May 17 00:35:41.532238 kubelet[2612]: W0517 00:35:41.532219 2612 reflector.go:561] object-"calico-system"/"cni-config": failed to list *v1.ConfigMap: configmaps "cni-config" is forbidden: User "system:node:ip-172-31-29-247" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ip-172-31-29-247' and this object May 17 00:35:41.532349 kubelet[2612]: E0517 00:35:41.532335 2612 reflector.go:158] "Unhandled Error" err="object-\"calico-system\"/\"cni-config\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"cni-config\" is forbidden: User \"system:node:ip-172-31-29-247\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"calico-system\": no relationship found between node 'ip-172-31-29-247' and this object" logger="UnhandledError" May 17 00:35:41.532568 systemd[1]: Created slice kubepods-besteffort-podb7454b35_9e9a_42c1_928e_af3e379afb41.slice. May 17 00:35:41.679101 kubelet[2612]: I0517 00:35:41.679034 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/b7454b35-9e9a-42c1-928e-af3e379afb41-cni-net-dir\") pod \"calico-node-84swf\" (UID: \"b7454b35-9e9a-42c1-928e-af3e379afb41\") " pod="calico-system/calico-node-84swf" May 17 00:35:41.679101 kubelet[2612]: I0517 00:35:41.679098 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/b7454b35-9e9a-42c1-928e-af3e379afb41-var-run-calico\") pod \"calico-node-84swf\" (UID: \"b7454b35-9e9a-42c1-928e-af3e379afb41\") " pod="calico-system/calico-node-84swf" May 17 00:35:41.679353 kubelet[2612]: I0517 00:35:41.679130 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/b7454b35-9e9a-42c1-928e-af3e379afb41-flexvol-driver-host\") pod \"calico-node-84swf\" (UID: \"b7454b35-9e9a-42c1-928e-af3e379afb41\") " pod="calico-system/calico-node-84swf" May 17 00:35:41.679353 kubelet[2612]: I0517 00:35:41.679152 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/b7454b35-9e9a-42c1-928e-af3e379afb41-node-certs\") pod \"calico-node-84swf\" (UID: \"b7454b35-9e9a-42c1-928e-af3e379afb41\") " pod="calico-system/calico-node-84swf" May 17 00:35:41.679353 kubelet[2612]: I0517 00:35:41.679177 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-h89t6\" (UniqueName: \"kubernetes.io/projected/b7454b35-9e9a-42c1-928e-af3e379afb41-kube-api-access-h89t6\") pod \"calico-node-84swf\" (UID: \"b7454b35-9e9a-42c1-928e-af3e379afb41\") " pod="calico-system/calico-node-84swf" May 17 00:35:41.679353 kubelet[2612]: I0517 00:35:41.679201 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/b7454b35-9e9a-42c1-928e-af3e379afb41-cni-log-dir\") pod \"calico-node-84swf\" (UID: \"b7454b35-9e9a-42c1-928e-af3e379afb41\") " pod="calico-system/calico-node-84swf" May 17 00:35:41.679353 kubelet[2612]: I0517 00:35:41.679229 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b7454b35-9e9a-42c1-928e-af3e379afb41-tigera-ca-bundle\") pod \"calico-node-84swf\" (UID: \"b7454b35-9e9a-42c1-928e-af3e379afb41\") " pod="calico-system/calico-node-84swf" May 17 00:35:41.679589 kubelet[2612]: I0517 00:35:41.679253 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/b7454b35-9e9a-42c1-928e-af3e379afb41-xtables-lock\") pod \"calico-node-84swf\" (UID: \"b7454b35-9e9a-42c1-928e-af3e379afb41\") " pod="calico-system/calico-node-84swf" May 17 00:35:41.679589 kubelet[2612]: I0517 00:35:41.679274 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/b7454b35-9e9a-42c1-928e-af3e379afb41-policysync\") pod \"calico-node-84swf\" (UID: \"b7454b35-9e9a-42c1-928e-af3e379afb41\") " pod="calico-system/calico-node-84swf" May 17 00:35:41.679589 kubelet[2612]: I0517 00:35:41.679300 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/b7454b35-9e9a-42c1-928e-af3e379afb41-cni-bin-dir\") pod \"calico-node-84swf\" (UID: \"b7454b35-9e9a-42c1-928e-af3e379afb41\") " pod="calico-system/calico-node-84swf" May 17 00:35:41.679589 kubelet[2612]: I0517 00:35:41.679324 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/b7454b35-9e9a-42c1-928e-af3e379afb41-lib-modules\") pod \"calico-node-84swf\" (UID: \"b7454b35-9e9a-42c1-928e-af3e379afb41\") " pod="calico-system/calico-node-84swf" May 17 00:35:41.679589 kubelet[2612]: I0517 00:35:41.679352 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/b7454b35-9e9a-42c1-928e-af3e379afb41-var-lib-calico\") pod \"calico-node-84swf\" (UID: \"b7454b35-9e9a-42c1-928e-af3e379afb41\") " pod="calico-system/calico-node-84swf" May 17 00:35:41.719172 kernel: kauditd_printk_skb: 19 callbacks suppressed May 17 00:35:41.719305 kernel: audit: type=1400 audit(1747442141.713:955): avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:41.713000 audit[2468]: AVC avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:41.731613 kernel: audit: type=1300 audit(1747442141.713:955): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e34390 a2=fc6 a3=0 items=0 ppid=2314 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 key=(null) May 17 00:35:41.713000 audit[2468]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e34390 a2=fc6 a3=0 items=0 ppid=2314 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 key=(null) May 17 00:35:41.713000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:35:41.715000 audit[2468]: AVC avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:41.744822 kernel: audit: type=1327 audit(1747442141.713:955): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:35:41.744967 kernel: audit: type=1400 audit(1747442141.715:956): avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:41.745006 kernel: audit: type=1300 audit(1747442141.715:956): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000b0c940 a2=fc6 a3=0 items=0 ppid=2314 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 key=(null) May 17 00:35:41.715000 audit[2468]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000b0c940 a2=fc6 a3=0 items=0 ppid=2314 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 key=(null) May 17 00:35:41.715000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:35:41.760091 kernel: audit: type=1327 audit(1747442141.715:956): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:35:41.766000 audit[3273]: NETFILTER_CFG table=filter:97 family=2 entries=20 op=nft_register_rule pid=3273 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:41.772736 kernel: audit: type=1325 audit(1747442141.766:957): table=filter:97 family=2 entries=20 op=nft_register_rule pid=3273 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:41.766000 audit[3273]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7fff4e3fba00 a2=0 a3=7fff4e3fb9ec items=0 ppid=2984 pid=3273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:41.766000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:41.783795 kernel: audit: type=1300 audit(1747442141.766:957): arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7fff4e3fba00 a2=0 a3=7fff4e3fb9ec items=0 ppid=2984 pid=3273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:41.783923 kernel: audit: type=1327 audit(1747442141.766:957): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:41.773000 audit[3273]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=3273 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:41.785929 kubelet[2612]: E0517 00:35:41.785763 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:41.786053 kubelet[2612]: W0517 00:35:41.786035 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:41.786142 kubelet[2612]: E0517 00:35:41.786131 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:41.789334 env[1754]: time="2025-05-17T00:35:41.788937746Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5fd64f6478-74lvz,Uid:f56a86e6-c008-4f94-9080-864264191baa,Namespace:calico-system,Attempt:0,}" May 17 00:35:41.789806 kernel: audit: type=1325 audit(1747442141.773:958): table=nat:98 family=2 entries=12 op=nft_register_rule pid=3273 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:41.773000 audit[3273]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff4e3fba00 a2=0 a3=0 items=0 ppid=2984 pid=3273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:41.773000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:41.808827 kubelet[2612]: E0517 00:35:41.808805 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:41.808983 kubelet[2612]: W0517 00:35:41.808968 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:41.809065 kubelet[2612]: E0517 00:35:41.809053 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:41.811062 env[1754]: time="2025-05-17T00:35:41.810980656Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:35:41.811182 env[1754]: time="2025-05-17T00:35:41.811085009Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:35:41.811182 env[1754]: time="2025-05-17T00:35:41.811118851Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:35:41.811368 env[1754]: time="2025-05-17T00:35:41.811326619Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/657528c4cf525e9151f814734db99d1a353826ccba0b773c53371486d0465b1d pid=3284 runtime=io.containerd.runc.v2 May 17 00:35:41.825260 systemd[1]: Started cri-containerd-657528c4cf525e9151f814734db99d1a353826ccba0b773c53371486d0465b1d.scope. May 17 00:35:41.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:41.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:41.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:41.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:41.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:41.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:41.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:41.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:41.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:41.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:41.849000 audit: BPF prog-id=124 op=LOAD May 17 00:35:41.849000 audit[3294]: AVC avc: denied { bpf } for pid=3294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:41.849000 audit[3294]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3284 pid=3294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:41.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635373532386334636635323565393135316638313437333464623939 May 17 00:35:41.849000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:41.849000 audit[3294]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3284 pid=3294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:41.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635373532386334636635323565393135316638313437333464623939 May 17 00:35:41.849000 audit[3294]: AVC avc: denied { bpf } for pid=3294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:41.849000 audit[3294]: AVC avc: denied { bpf } for pid=3294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:41.849000 audit[3294]: AVC avc: denied { bpf } for pid=3294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:41.849000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:41.849000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:41.849000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:41.849000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:41.849000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:41.849000 audit[3294]: AVC avc: denied { bpf } for pid=3294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:41.849000 audit[3294]: AVC avc: denied { bpf } for pid=3294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:41.849000 audit: BPF prog-id=125 op=LOAD May 17 00:35:41.849000 audit[3294]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003c8130 items=0 ppid=3284 pid=3294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:41.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635373532386334636635323565393135316638313437333464623939 May 17 00:35:41.849000 audit[3294]: AVC avc: denied { bpf } for pid=3294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:41.849000 audit[3294]: AVC avc: denied { bpf } for pid=3294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:41.849000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:41.849000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:41.849000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:41.849000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:41.849000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:41.849000 audit[3294]: AVC avc: denied { bpf } for pid=3294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:41.849000 audit[3294]: AVC avc: denied { bpf } for pid=3294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:41.849000 audit: BPF prog-id=126 op=LOAD May 17 00:35:41.849000 audit[3294]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003c8178 items=0 ppid=3284 pid=3294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:41.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635373532386334636635323565393135316638313437333464623939 May 17 00:35:41.849000 audit: BPF prog-id=126 op=UNLOAD May 17 00:35:41.849000 audit: BPF prog-id=125 op=UNLOAD May 17 00:35:41.849000 audit[3294]: AVC avc: denied { bpf } for pid=3294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:41.849000 audit[3294]: AVC avc: denied { bpf } for pid=3294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:41.849000 audit[3294]: AVC avc: denied { bpf } for pid=3294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:41.849000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:41.849000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:41.849000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:41.849000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:41.849000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:41.849000 audit[3294]: AVC avc: denied { bpf } for pid=3294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:41.849000 audit[3294]: AVC avc: denied { bpf } for pid=3294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:41.849000 audit: BPF prog-id=127 op=LOAD May 17 00:35:41.849000 audit[3294]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c8588 items=0 ppid=3284 pid=3294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:41.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635373532386334636635323565393135316638313437333464623939 May 17 00:35:41.879005 kubelet[2612]: E0517 00:35:41.878948 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-z4dbv" podUID="125bc07b-a5e7-420d-bbe5-934e8bac8b88" May 17 00:35:41.880551 kubelet[2612]: E0517 00:35:41.880522 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:41.880551 kubelet[2612]: W0517 00:35:41.880545 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:41.880748 kubelet[2612]: E0517 00:35:41.880565 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:41.881034 kubelet[2612]: E0517 00:35:41.881015 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:41.881034 kubelet[2612]: W0517 00:35:41.881031 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:41.881119 kubelet[2612]: E0517 00:35:41.881057 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:41.882312 kubelet[2612]: E0517 00:35:41.882291 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:41.882312 kubelet[2612]: W0517 00:35:41.882307 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:41.882436 kubelet[2612]: E0517 00:35:41.882319 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:41.882909 kubelet[2612]: E0517 00:35:41.882889 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:41.882909 kubelet[2612]: W0517 00:35:41.882907 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:41.883006 kubelet[2612]: E0517 00:35:41.882919 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:41.884699 kubelet[2612]: E0517 00:35:41.884680 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:41.884699 kubelet[2612]: W0517 00:35:41.884696 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:41.884699 kubelet[2612]: E0517 00:35:41.884722 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:41.885032 kubelet[2612]: E0517 00:35:41.885012 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:41.885032 kubelet[2612]: W0517 00:35:41.885027 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:41.885114 kubelet[2612]: E0517 00:35:41.885038 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:41.888878 kubelet[2612]: E0517 00:35:41.888850 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:41.888878 kubelet[2612]: W0517 00:35:41.888874 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:41.889023 kubelet[2612]: E0517 00:35:41.888898 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:41.889119 kubelet[2612]: E0517 00:35:41.889107 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:41.889154 kubelet[2612]: W0517 00:35:41.889119 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:41.889154 kubelet[2612]: E0517 00:35:41.889129 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:41.897720 kubelet[2612]: E0517 00:35:41.897680 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:41.897892 kubelet[2612]: W0517 00:35:41.897855 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:41.897948 kubelet[2612]: E0517 00:35:41.897887 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:41.898246 kubelet[2612]: E0517 00:35:41.898227 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:41.898246 kubelet[2612]: W0517 00:35:41.898245 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:41.898409 kubelet[2612]: E0517 00:35:41.898262 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:41.898483 kubelet[2612]: E0517 00:35:41.898469 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:41.898532 kubelet[2612]: W0517 00:35:41.898486 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:41.898532 kubelet[2612]: E0517 00:35:41.898502 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:41.898750 kubelet[2612]: E0517 00:35:41.898734 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:41.898834 kubelet[2612]: W0517 00:35:41.898751 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:41.898834 kubelet[2612]: E0517 00:35:41.898765 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:41.899009 kubelet[2612]: E0517 00:35:41.898997 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:41.899094 kubelet[2612]: W0517 00:35:41.899010 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:41.899094 kubelet[2612]: E0517 00:35:41.899024 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:41.899217 kubelet[2612]: E0517 00:35:41.899204 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:41.899271 kubelet[2612]: W0517 00:35:41.899219 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:41.899271 kubelet[2612]: E0517 00:35:41.899231 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:41.899428 kubelet[2612]: E0517 00:35:41.899415 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:41.899484 kubelet[2612]: W0517 00:35:41.899429 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:41.899484 kubelet[2612]: E0517 00:35:41.899441 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:41.899641 kubelet[2612]: E0517 00:35:41.899629 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:41.899693 kubelet[2612]: W0517 00:35:41.899642 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:41.899693 kubelet[2612]: E0517 00:35:41.899655 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:41.899987 kubelet[2612]: E0517 00:35:41.899971 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:41.900052 kubelet[2612]: W0517 00:35:41.899988 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:41.900052 kubelet[2612]: E0517 00:35:41.900002 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:41.902632 kubelet[2612]: E0517 00:35:41.900280 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:41.902632 kubelet[2612]: W0517 00:35:41.900295 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:41.902632 kubelet[2612]: E0517 00:35:41.900315 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:41.902632 kubelet[2612]: E0517 00:35:41.900565 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:41.902632 kubelet[2612]: W0517 00:35:41.900592 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:41.902632 kubelet[2612]: E0517 00:35:41.900605 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:41.902632 kubelet[2612]: E0517 00:35:41.900846 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:41.902632 kubelet[2612]: W0517 00:35:41.900857 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:41.905687 kubelet[2612]: E0517 00:35:41.904266 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:41.905687 kubelet[2612]: E0517 00:35:41.904879 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:41.905687 kubelet[2612]: W0517 00:35:41.904896 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:41.905687 kubelet[2612]: E0517 00:35:41.904929 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:41.905687 kubelet[2612]: I0517 00:35:41.904963 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/125bc07b-a5e7-420d-bbe5-934e8bac8b88-registration-dir\") pod \"csi-node-driver-z4dbv\" (UID: \"125bc07b-a5e7-420d-bbe5-934e8bac8b88\") " pod="calico-system/csi-node-driver-z4dbv" May 17 00:35:41.905687 kubelet[2612]: E0517 00:35:41.905265 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:41.905687 kubelet[2612]: W0517 00:35:41.905278 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:41.905687 kubelet[2612]: E0517 00:35:41.905292 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:41.906059 kubelet[2612]: I0517 00:35:41.905339 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/125bc07b-a5e7-420d-bbe5-934e8bac8b88-kubelet-dir\") pod \"csi-node-driver-z4dbv\" (UID: \"125bc07b-a5e7-420d-bbe5-934e8bac8b88\") " pod="calico-system/csi-node-driver-z4dbv" May 17 00:35:41.906059 kubelet[2612]: E0517 00:35:41.905596 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:41.906059 kubelet[2612]: W0517 00:35:41.905608 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:41.906059 kubelet[2612]: E0517 00:35:41.905624 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:41.906059 kubelet[2612]: I0517 00:35:41.905664 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/125bc07b-a5e7-420d-bbe5-934e8bac8b88-socket-dir\") pod \"csi-node-driver-z4dbv\" (UID: \"125bc07b-a5e7-420d-bbe5-934e8bac8b88\") " pod="calico-system/csi-node-driver-z4dbv" May 17 00:35:41.906059 kubelet[2612]: E0517 00:35:41.905917 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:41.906059 kubelet[2612]: W0517 00:35:41.905929 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:41.906059 kubelet[2612]: E0517 00:35:41.905960 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:41.906426 kubelet[2612]: I0517 00:35:41.905986 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sg6gc\" (UniqueName: \"kubernetes.io/projected/125bc07b-a5e7-420d-bbe5-934e8bac8b88-kube-api-access-sg6gc\") pod \"csi-node-driver-z4dbv\" (UID: \"125bc07b-a5e7-420d-bbe5-934e8bac8b88\") " pod="calico-system/csi-node-driver-z4dbv" May 17 00:35:41.906426 kubelet[2612]: E0517 00:35:41.906279 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:41.906426 kubelet[2612]: W0517 00:35:41.906291 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:41.906426 kubelet[2612]: E0517 00:35:41.906305 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:41.906610 kubelet[2612]: E0517 00:35:41.906555 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:41.906610 kubelet[2612]: W0517 00:35:41.906565 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:41.906610 kubelet[2612]: E0517 00:35:41.906594 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:41.906760 kubelet[2612]: I0517 00:35:41.906619 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/125bc07b-a5e7-420d-bbe5-934e8bac8b88-varrun\") pod \"csi-node-driver-z4dbv\" (UID: \"125bc07b-a5e7-420d-bbe5-934e8bac8b88\") " pod="calico-system/csi-node-driver-z4dbv" May 17 00:35:41.911009 kubelet[2612]: E0517 00:35:41.906986 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:41.911009 kubelet[2612]: W0517 00:35:41.907002 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:41.911009 kubelet[2612]: E0517 00:35:41.907033 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:41.911009 kubelet[2612]: E0517 00:35:41.907263 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:41.911009 kubelet[2612]: W0517 00:35:41.907274 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:41.911009 kubelet[2612]: E0517 00:35:41.907287 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:41.911009 kubelet[2612]: E0517 00:35:41.907536 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:41.911009 kubelet[2612]: W0517 00:35:41.907564 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:41.911009 kubelet[2612]: E0517 00:35:41.907578 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:41.911009 kubelet[2612]: E0517 00:35:41.907778 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:41.911493 kubelet[2612]: W0517 00:35:41.907787 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:41.911493 kubelet[2612]: E0517 00:35:41.907800 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:41.911493 kubelet[2612]: E0517 00:35:41.908014 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:41.911493 kubelet[2612]: W0517 00:35:41.908023 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:41.911493 kubelet[2612]: E0517 00:35:41.908036 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:41.911493 kubelet[2612]: E0517 00:35:41.908217 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:41.911493 kubelet[2612]: W0517 00:35:41.908226 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:41.911493 kubelet[2612]: E0517 00:35:41.908239 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:41.911493 kubelet[2612]: E0517 00:35:41.908432 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:41.911493 kubelet[2612]: W0517 00:35:41.908442 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:41.911950 kubelet[2612]: E0517 00:35:41.908455 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:41.911950 kubelet[2612]: E0517 00:35:41.908648 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:41.911950 kubelet[2612]: W0517 00:35:41.908659 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:41.911950 kubelet[2612]: E0517 00:35:41.908672 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:41.911950 kubelet[2612]: E0517 00:35:41.908907 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:41.911950 kubelet[2612]: W0517 00:35:41.908917 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:41.911950 kubelet[2612]: E0517 00:35:41.908929 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:41.911950 kubelet[2612]: E0517 00:35:41.909106 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:41.911950 kubelet[2612]: W0517 00:35:41.909114 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:41.911950 kubelet[2612]: E0517 00:35:41.909125 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:41.922284 env[1754]: time="2025-05-17T00:35:41.922239931Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5fd64f6478-74lvz,Uid:f56a86e6-c008-4f94-9080-864264191baa,Namespace:calico-system,Attempt:0,} returns sandbox id \"657528c4cf525e9151f814734db99d1a353826ccba0b773c53371486d0465b1d\"" May 17 00:35:41.925233 env[1754]: time="2025-05-17T00:35:41.925193030Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.0\"" May 17 00:35:42.008335 kubelet[2612]: E0517 00:35:42.008299 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:42.008335 kubelet[2612]: W0517 00:35:42.008328 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:42.008589 kubelet[2612]: E0517 00:35:42.008356 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:42.008696 kubelet[2612]: E0517 00:35:42.008680 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:42.008772 kubelet[2612]: W0517 00:35:42.008697 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:42.008772 kubelet[2612]: E0517 00:35:42.008735 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:42.009021 kubelet[2612]: E0517 00:35:42.009003 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:42.009021 kubelet[2612]: W0517 00:35:42.009019 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:42.009161 kubelet[2612]: E0517 00:35:42.009037 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:42.009306 kubelet[2612]: E0517 00:35:42.009284 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:42.009306 kubelet[2612]: W0517 00:35:42.009299 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:42.009410 kubelet[2612]: E0517 00:35:42.009318 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:42.009585 kubelet[2612]: E0517 00:35:42.009568 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:42.009585 kubelet[2612]: W0517 00:35:42.009584 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:42.009721 kubelet[2612]: E0517 00:35:42.009601 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:42.009881 kubelet[2612]: E0517 00:35:42.009866 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:42.009947 kubelet[2612]: W0517 00:35:42.009882 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:42.010005 kubelet[2612]: E0517 00:35:42.009979 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:42.010157 kubelet[2612]: E0517 00:35:42.010141 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:42.010214 kubelet[2612]: W0517 00:35:42.010158 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:42.010266 kubelet[2612]: E0517 00:35:42.010250 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:42.010409 kubelet[2612]: E0517 00:35:42.010382 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:42.010409 kubelet[2612]: W0517 00:35:42.010398 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:42.010522 kubelet[2612]: E0517 00:35:42.010486 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:42.010627 kubelet[2612]: E0517 00:35:42.010613 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:42.010692 kubelet[2612]: W0517 00:35:42.010629 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:42.010769 kubelet[2612]: E0517 00:35:42.010749 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:42.010925 kubelet[2612]: E0517 00:35:42.010907 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:42.010987 kubelet[2612]: W0517 00:35:42.010925 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:42.011034 kubelet[2612]: E0517 00:35:42.011014 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:42.011158 kubelet[2612]: E0517 00:35:42.011144 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:42.011212 kubelet[2612]: W0517 00:35:42.011160 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:42.011265 kubelet[2612]: E0517 00:35:42.011245 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:42.011394 kubelet[2612]: E0517 00:35:42.011379 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:42.011455 kubelet[2612]: W0517 00:35:42.011395 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:42.011455 kubelet[2612]: E0517 00:35:42.011411 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:42.012195 kubelet[2612]: E0517 00:35:42.012174 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:42.012195 kubelet[2612]: W0517 00:35:42.012193 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:42.012332 kubelet[2612]: E0517 00:35:42.012289 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:42.012454 kubelet[2612]: E0517 00:35:42.012439 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:42.012528 kubelet[2612]: W0517 00:35:42.012454 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:42.012584 kubelet[2612]: E0517 00:35:42.012542 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:42.012688 kubelet[2612]: E0517 00:35:42.012675 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:42.012756 kubelet[2612]: W0517 00:35:42.012689 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:42.013087 kubelet[2612]: E0517 00:35:42.013064 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:42.013333 kubelet[2612]: E0517 00:35:42.013315 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:42.013333 kubelet[2612]: W0517 00:35:42.013332 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:42.013469 kubelet[2612]: E0517 00:35:42.013421 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:42.013571 kubelet[2612]: E0517 00:35:42.013555 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:42.013623 kubelet[2612]: W0517 00:35:42.013571 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:42.013767 kubelet[2612]: E0517 00:35:42.013751 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:42.013920 kubelet[2612]: E0517 00:35:42.013906 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:42.013980 kubelet[2612]: W0517 00:35:42.013921 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:42.014027 kubelet[2612]: E0517 00:35:42.014011 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:42.014191 kubelet[2612]: E0517 00:35:42.014176 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:42.014251 kubelet[2612]: W0517 00:35:42.014191 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:42.014302 kubelet[2612]: E0517 00:35:42.014281 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:42.014454 kubelet[2612]: E0517 00:35:42.014438 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:42.014511 kubelet[2612]: W0517 00:35:42.014454 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:42.014558 kubelet[2612]: E0517 00:35:42.014544 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:42.014859 kubelet[2612]: E0517 00:35:42.014834 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:42.014931 kubelet[2612]: W0517 00:35:42.014861 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:42.014989 kubelet[2612]: E0517 00:35:42.014953 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:42.015133 kubelet[2612]: E0517 00:35:42.015118 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:42.015133 kubelet[2612]: W0517 00:35:42.015133 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:42.015426 kubelet[2612]: E0517 00:35:42.015411 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:42.015501 kubelet[2612]: W0517 00:35:42.015426 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:42.015501 kubelet[2612]: E0517 00:35:42.015441 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:42.015784 kubelet[2612]: E0517 00:35:42.015691 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:42.015954 kubelet[2612]: E0517 00:35:42.015939 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:42.016017 kubelet[2612]: W0517 00:35:42.015954 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:42.016017 kubelet[2612]: E0517 00:35:42.015972 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:42.016231 kubelet[2612]: E0517 00:35:42.016216 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:42.016285 kubelet[2612]: W0517 00:35:42.016232 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:42.016285 kubelet[2612]: E0517 00:35:42.016249 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:42.016716 kubelet[2612]: E0517 00:35:42.016684 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:42.017166 kubelet[2612]: W0517 00:35:42.016712 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:42.017237 kubelet[2612]: E0517 00:35:42.017173 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:42.036887 kubelet[2612]: E0517 00:35:42.036785 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:42.036887 kubelet[2612]: W0517 00:35:42.036817 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:42.036887 kubelet[2612]: E0517 00:35:42.036848 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:42.111524 kubelet[2612]: E0517 00:35:42.111490 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:42.111524 kubelet[2612]: W0517 00:35:42.111516 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:42.111752 kubelet[2612]: E0517 00:35:42.111543 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:42.215245 kubelet[2612]: E0517 00:35:42.215213 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:42.215245 kubelet[2612]: W0517 00:35:42.215242 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:42.215480 kubelet[2612]: E0517 00:35:42.215266 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:42.316107 kubelet[2612]: E0517 00:35:42.315877 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:42.316107 kubelet[2612]: W0517 00:35:42.315899 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:42.316107 kubelet[2612]: E0517 00:35:42.315937 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:42.417243 kubelet[2612]: E0517 00:35:42.417211 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:42.417243 kubelet[2612]: W0517 00:35:42.417238 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:42.417756 kubelet[2612]: E0517 00:35:42.417263 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:42.518810 kubelet[2612]: E0517 00:35:42.518765 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:42.518810 kubelet[2612]: W0517 00:35:42.518790 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:42.518810 kubelet[2612]: E0517 00:35:42.518812 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:42.620406 kubelet[2612]: E0517 00:35:42.620301 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:42.620406 kubelet[2612]: W0517 00:35:42.620323 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:42.620406 kubelet[2612]: E0517 00:35:42.620344 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:42.721657 kubelet[2612]: E0517 00:35:42.721585 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:42.721657 kubelet[2612]: W0517 00:35:42.721605 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:42.721657 kubelet[2612]: E0517 00:35:42.721626 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:42.783514 kubelet[2612]: E0517 00:35:42.783467 2612 secret.go:189] Couldn't get secret calico-system/node-certs: failed to sync secret cache: timed out waiting for the condition May 17 00:35:42.783868 kubelet[2612]: E0517 00:35:42.783837 2612 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/b7454b35-9e9a-42c1-928e-af3e379afb41-node-certs podName:b7454b35-9e9a-42c1-928e-af3e379afb41 nodeName:}" failed. No retries permitted until 2025-05-17 00:35:43.283804509 +0000 UTC m=+53.669696841 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "node-certs" (UniqueName: "kubernetes.io/secret/b7454b35-9e9a-42c1-928e-af3e379afb41-node-certs") pod "calico-node-84swf" (UID: "b7454b35-9e9a-42c1-928e-af3e379afb41") : failed to sync secret cache: timed out waiting for the condition May 17 00:35:42.823116 kubelet[2612]: E0517 00:35:42.823091 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:42.823266 kubelet[2612]: W0517 00:35:42.823251 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:42.823366 kubelet[2612]: E0517 00:35:42.823354 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:42.925239 kubelet[2612]: E0517 00:35:42.925183 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:42.925239 kubelet[2612]: W0517 00:35:42.925213 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:42.925239 kubelet[2612]: E0517 00:35:42.925236 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:43.025850 kubelet[2612]: E0517 00:35:43.025818 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:43.025850 kubelet[2612]: W0517 00:35:43.025841 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:43.026018 kubelet[2612]: E0517 00:35:43.025862 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:43.126943 kubelet[2612]: E0517 00:35:43.126910 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:43.126943 kubelet[2612]: W0517 00:35:43.126939 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:43.127135 kubelet[2612]: E0517 00:35:43.126963 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:43.230683 kubelet[2612]: E0517 00:35:43.229816 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:43.230683 kubelet[2612]: W0517 00:35:43.229843 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:43.230683 kubelet[2612]: E0517 00:35:43.229870 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:43.303761 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1114368056.mount: Deactivated successfully. May 17 00:35:43.331059 kubelet[2612]: E0517 00:35:43.331023 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:43.331059 kubelet[2612]: W0517 00:35:43.331057 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:43.331338 kubelet[2612]: E0517 00:35:43.331086 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:43.331498 kubelet[2612]: E0517 00:35:43.331479 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:43.331574 kubelet[2612]: W0517 00:35:43.331502 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:43.331574 kubelet[2612]: E0517 00:35:43.331534 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:43.331833 kubelet[2612]: E0517 00:35:43.331816 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:43.331919 kubelet[2612]: W0517 00:35:43.331835 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:43.331919 kubelet[2612]: E0517 00:35:43.331854 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:43.332080 kubelet[2612]: E0517 00:35:43.332065 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:43.332172 kubelet[2612]: W0517 00:35:43.332083 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:43.332172 kubelet[2612]: E0517 00:35:43.332098 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:43.332370 kubelet[2612]: E0517 00:35:43.332352 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:43.332431 kubelet[2612]: W0517 00:35:43.332373 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:43.332431 kubelet[2612]: E0517 00:35:43.332389 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:43.347336 kubelet[2612]: E0517 00:35:43.347303 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:43.347336 kubelet[2612]: W0517 00:35:43.347327 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:43.347525 kubelet[2612]: E0517 00:35:43.347353 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:43.636908 env[1754]: time="2025-05-17T00:35:43.636799536Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-84swf,Uid:b7454b35-9e9a-42c1-928e-af3e379afb41,Namespace:calico-system,Attempt:0,}" May 17 00:35:43.670989 env[1754]: time="2025-05-17T00:35:43.670828531Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:35:43.670989 env[1754]: time="2025-05-17T00:35:43.670899222Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:35:43.670989 env[1754]: time="2025-05-17T00:35:43.670926532Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:35:43.671608 env[1754]: time="2025-05-17T00:35:43.671499671Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/13d6a3e7831fd018079bee1376ef31e23ed628c2f1cc34d7a6e180f66ed207fa pid=3407 runtime=io.containerd.runc.v2 May 17 00:35:43.732595 systemd[1]: Started cri-containerd-13d6a3e7831fd018079bee1376ef31e23ed628c2f1cc34d7a6e180f66ed207fa.scope. May 17 00:35:43.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:43.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:43.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:43.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:43.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:43.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:43.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:43.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:43.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:43.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:43.786000 audit: BPF prog-id=128 op=LOAD May 17 00:35:43.787000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:43.787000 audit[3416]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3407 pid=3416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:43.787000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133643661336537383331666430313830373962656531333736656633 May 17 00:35:43.787000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:43.787000 audit[3416]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3407 pid=3416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:43.787000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133643661336537383331666430313830373962656531333736656633 May 17 00:35:43.787000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:43.787000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:43.787000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:43.787000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:43.787000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:43.787000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:43.787000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:43.787000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:43.787000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:43.787000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:43.787000 audit: BPF prog-id=129 op=LOAD May 17 00:35:43.787000 audit[3416]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00031e5d0 items=0 ppid=3407 pid=3416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:43.787000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133643661336537383331666430313830373962656531333736656633 May 17 00:35:43.788000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:43.788000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:43.788000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:43.788000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:43.788000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:43.788000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:43.788000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:43.788000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:43.788000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:43.788000 audit: BPF prog-id=130 op=LOAD May 17 00:35:43.788000 audit[3416]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00031e618 items=0 ppid=3407 pid=3416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:43.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133643661336537383331666430313830373962656531333736656633 May 17 00:35:43.788000 audit: BPF prog-id=130 op=UNLOAD May 17 00:35:43.788000 audit: BPF prog-id=129 op=UNLOAD May 17 00:35:43.788000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:43.788000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:43.788000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:43.788000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:43.788000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:43.788000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:43.788000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:43.788000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:43.788000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:43.788000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:43.788000 audit: BPF prog-id=131 op=LOAD May 17 00:35:43.788000 audit[3416]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00031ea28 items=0 ppid=3407 pid=3416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:43.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133643661336537383331666430313830373962656531333736656633 May 17 00:35:43.817304 env[1754]: time="2025-05-17T00:35:43.817234913Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-84swf,Uid:b7454b35-9e9a-42c1-928e-af3e379afb41,Namespace:calico-system,Attempt:0,} returns sandbox id \"13d6a3e7831fd018079bee1376ef31e23ed628c2f1cc34d7a6e180f66ed207fa\"" May 17 00:35:43.824138 kubelet[2612]: E0517 00:35:43.823538 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-z4dbv" podUID="125bc07b-a5e7-420d-bbe5-934e8bac8b88" May 17 00:35:44.627432 env[1754]: time="2025-05-17T00:35:44.627373244Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:44.631430 env[1754]: time="2025-05-17T00:35:44.631384261Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:71be0570e8645ac646675719e0da6ac33a05810991b31aecc303e7add70933be,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:44.634347 env[1754]: time="2025-05-17T00:35:44.634308760Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:44.637544 env[1754]: time="2025-05-17T00:35:44.637509311Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:d282f6c773c4631b9dc8379eb093c54ca34c7728d55d6509cb45da5e1f5baf8f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:44.638032 env[1754]: time="2025-05-17T00:35:44.637905536Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.0\" returns image reference \"sha256:71be0570e8645ac646675719e0da6ac33a05810991b31aecc303e7add70933be\"" May 17 00:35:44.642343 env[1754]: time="2025-05-17T00:35:44.640195341Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\"" May 17 00:35:44.663485 env[1754]: time="2025-05-17T00:35:44.663440000Z" level=info msg="CreateContainer within sandbox \"657528c4cf525e9151f814734db99d1a353826ccba0b773c53371486d0465b1d\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 17 00:35:44.684820 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount23091263.mount: Deactivated successfully. May 17 00:35:44.697531 env[1754]: time="2025-05-17T00:35:44.697479854Z" level=info msg="CreateContainer within sandbox \"657528c4cf525e9151f814734db99d1a353826ccba0b773c53371486d0465b1d\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"579ae3b6ceb020e67f74435a7fbe865c02f618ba97115d9b92527090a9d1f08a\"" May 17 00:35:44.698399 env[1754]: time="2025-05-17T00:35:44.698370058Z" level=info msg="StartContainer for \"579ae3b6ceb020e67f74435a7fbe865c02f618ba97115d9b92527090a9d1f08a\"" May 17 00:35:44.728740 systemd[1]: Started cri-containerd-579ae3b6ceb020e67f74435a7fbe865c02f618ba97115d9b92527090a9d1f08a.scope. May 17 00:35:44.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:44.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:44.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:44.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:44.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:44.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:44.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:44.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:44.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:44.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:44.754000 audit: BPF prog-id=132 op=LOAD May 17 00:35:44.755000 audit[3452]: AVC avc: denied { bpf } for pid=3452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:44.755000 audit[3452]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3284 pid=3452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:44.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537396165336236636562303230653637663734343335613766626538 May 17 00:35:44.755000 audit[3452]: AVC avc: denied { perfmon } for pid=3452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:44.755000 audit[3452]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3284 pid=3452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:44.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537396165336236636562303230653637663734343335613766626538 May 17 00:35:44.755000 audit[3452]: AVC avc: denied { bpf } for pid=3452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:44.755000 audit[3452]: AVC avc: denied { bpf } for pid=3452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:44.755000 audit[3452]: AVC avc: denied { bpf } for pid=3452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:44.755000 audit[3452]: AVC avc: denied { perfmon } for pid=3452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:44.755000 audit[3452]: AVC avc: denied { perfmon } for pid=3452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:44.755000 audit[3452]: AVC avc: denied { perfmon } for pid=3452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:44.755000 audit[3452]: AVC avc: denied { perfmon } for pid=3452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:44.755000 audit[3452]: AVC avc: denied { perfmon } for pid=3452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:44.755000 audit[3452]: AVC avc: denied { bpf } for pid=3452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:44.755000 audit[3452]: AVC avc: denied { bpf } for pid=3452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:44.755000 audit: BPF prog-id=133 op=LOAD May 17 00:35:44.755000 audit[3452]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000235a40 items=0 ppid=3284 pid=3452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:44.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537396165336236636562303230653637663734343335613766626538 May 17 00:35:44.756000 audit[3452]: AVC avc: denied { bpf } for pid=3452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:44.756000 audit[3452]: AVC avc: denied { bpf } for pid=3452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:44.756000 audit[3452]: AVC avc: denied { perfmon } for pid=3452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:44.756000 audit[3452]: AVC avc: denied { perfmon } for pid=3452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:44.756000 audit[3452]: AVC avc: denied { perfmon } for pid=3452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:44.756000 audit[3452]: AVC avc: denied { perfmon } for pid=3452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:44.756000 audit[3452]: AVC avc: denied { perfmon } for pid=3452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:44.756000 audit[3452]: AVC avc: denied { bpf } for pid=3452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:44.756000 audit[3452]: AVC avc: denied { bpf } for pid=3452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:44.756000 audit: BPF prog-id=134 op=LOAD May 17 00:35:44.756000 audit[3452]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000235a88 items=0 ppid=3284 pid=3452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:44.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537396165336236636562303230653637663734343335613766626538 May 17 00:35:44.756000 audit: BPF prog-id=134 op=UNLOAD May 17 00:35:44.756000 audit: BPF prog-id=133 op=UNLOAD May 17 00:35:44.756000 audit[3452]: AVC avc: denied { bpf } for pid=3452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:44.756000 audit[3452]: AVC avc: denied { bpf } for pid=3452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:44.756000 audit[3452]: AVC avc: denied { bpf } for pid=3452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:44.756000 audit[3452]: AVC avc: denied { perfmon } for pid=3452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:44.756000 audit[3452]: AVC avc: denied { perfmon } for pid=3452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:44.756000 audit[3452]: AVC avc: denied { perfmon } for pid=3452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:44.756000 audit[3452]: AVC avc: denied { perfmon } for pid=3452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:44.756000 audit[3452]: AVC avc: denied { perfmon } for pid=3452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:44.756000 audit[3452]: AVC avc: denied { bpf } for pid=3452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:44.756000 audit[3452]: AVC avc: denied { bpf } for pid=3452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:44.756000 audit: BPF prog-id=135 op=LOAD May 17 00:35:44.756000 audit[3452]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000235e98 items=0 ppid=3284 pid=3452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:44.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537396165336236636562303230653637663734343335613766626538 May 17 00:35:44.793928 env[1754]: time="2025-05-17T00:35:44.793872819Z" level=info msg="StartContainer for \"579ae3b6ceb020e67f74435a7fbe865c02f618ba97115d9b92527090a9d1f08a\" returns successfully" May 17 00:35:45.033623 kubelet[2612]: E0517 00:35:45.033578 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:45.034214 kubelet[2612]: W0517 00:35:45.034184 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:45.034348 kubelet[2612]: E0517 00:35:45.034330 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:45.035018 kubelet[2612]: E0517 00:35:45.034898 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:45.035177 kubelet[2612]: W0517 00:35:45.035159 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:45.035286 kubelet[2612]: E0517 00:35:45.035273 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:45.035684 kubelet[2612]: E0517 00:35:45.035669 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:45.035824 kubelet[2612]: W0517 00:35:45.035808 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:45.035933 kubelet[2612]: E0517 00:35:45.035920 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:45.036293 kubelet[2612]: E0517 00:35:45.036279 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:45.036399 kubelet[2612]: W0517 00:35:45.036386 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:45.036602 kubelet[2612]: E0517 00:35:45.036582 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:45.036969 kubelet[2612]: E0517 00:35:45.036957 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:45.037100 kubelet[2612]: W0517 00:35:45.037085 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:45.037184 kubelet[2612]: E0517 00:35:45.037172 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:45.037478 kubelet[2612]: E0517 00:35:45.037466 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:45.037575 kubelet[2612]: W0517 00:35:45.037562 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:45.037648 kubelet[2612]: E0517 00:35:45.037637 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:45.040064 kubelet[2612]: E0517 00:35:45.040040 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:45.040541 kubelet[2612]: W0517 00:35:45.040515 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:45.040688 kubelet[2612]: E0517 00:35:45.040673 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:45.041113 kubelet[2612]: E0517 00:35:45.041098 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:45.041224 kubelet[2612]: W0517 00:35:45.041210 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:45.041306 kubelet[2612]: E0517 00:35:45.041291 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:45.041604 kubelet[2612]: E0517 00:35:45.041592 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:45.041729 kubelet[2612]: W0517 00:35:45.041693 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:45.041830 kubelet[2612]: E0517 00:35:45.041815 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:45.042110 kubelet[2612]: E0517 00:35:45.042097 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:45.042206 kubelet[2612]: W0517 00:35:45.042195 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:45.042278 kubelet[2612]: E0517 00:35:45.042267 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:45.042536 kubelet[2612]: E0517 00:35:45.042526 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:45.042626 kubelet[2612]: W0517 00:35:45.042614 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:45.042741 kubelet[2612]: E0517 00:35:45.042727 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:45.043036 kubelet[2612]: E0517 00:35:45.043026 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:45.043130 kubelet[2612]: W0517 00:35:45.043118 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:45.043208 kubelet[2612]: E0517 00:35:45.043197 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:45.043485 kubelet[2612]: E0517 00:35:45.043474 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:45.043574 kubelet[2612]: W0517 00:35:45.043562 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:45.043653 kubelet[2612]: E0517 00:35:45.043642 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:45.044206 kubelet[2612]: E0517 00:35:45.044002 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:45.044206 kubelet[2612]: W0517 00:35:45.044013 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:45.044206 kubelet[2612]: E0517 00:35:45.044026 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:45.048379 kubelet[2612]: E0517 00:35:45.048348 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:45.048593 kubelet[2612]: W0517 00:35:45.048552 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:45.048735 kubelet[2612]: E0517 00:35:45.048718 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:45.054866 kubelet[2612]: E0517 00:35:45.054832 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:45.055085 kubelet[2612]: W0517 00:35:45.055044 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:45.055227 kubelet[2612]: E0517 00:35:45.055209 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:45.055869 kubelet[2612]: E0517 00:35:45.055847 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:45.055869 kubelet[2612]: W0517 00:35:45.055868 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:45.056022 kubelet[2612]: E0517 00:35:45.055897 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:45.056222 kubelet[2612]: E0517 00:35:45.056207 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:45.056277 kubelet[2612]: W0517 00:35:45.056225 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:45.056277 kubelet[2612]: E0517 00:35:45.056242 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:45.056815 kubelet[2612]: E0517 00:35:45.056791 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:45.056815 kubelet[2612]: W0517 00:35:45.056813 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:45.056961 kubelet[2612]: E0517 00:35:45.056835 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:45.057110 kubelet[2612]: E0517 00:35:45.057093 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:45.057180 kubelet[2612]: W0517 00:35:45.057110 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:45.057226 kubelet[2612]: E0517 00:35:45.057207 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:45.057365 kubelet[2612]: E0517 00:35:45.057347 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:45.057365 kubelet[2612]: W0517 00:35:45.057364 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:45.057490 kubelet[2612]: E0517 00:35:45.057455 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:45.057611 kubelet[2612]: E0517 00:35:45.057596 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:45.057669 kubelet[2612]: W0517 00:35:45.057612 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:45.057669 kubelet[2612]: E0517 00:35:45.057631 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:45.057889 kubelet[2612]: E0517 00:35:45.057872 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:45.057964 kubelet[2612]: W0517 00:35:45.057892 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:45.057964 kubelet[2612]: E0517 00:35:45.057909 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:45.058137 kubelet[2612]: E0517 00:35:45.058130 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:45.058194 kubelet[2612]: W0517 00:35:45.058140 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:45.058194 kubelet[2612]: E0517 00:35:45.058156 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:45.058451 kubelet[2612]: E0517 00:35:45.058434 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:45.058451 kubelet[2612]: W0517 00:35:45.058451 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:45.058570 kubelet[2612]: E0517 00:35:45.058547 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:45.059073 kubelet[2612]: E0517 00:35:45.059054 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:45.059073 kubelet[2612]: W0517 00:35:45.059072 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:45.059225 kubelet[2612]: E0517 00:35:45.059207 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:45.059408 kubelet[2612]: E0517 00:35:45.059363 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:45.059408 kubelet[2612]: W0517 00:35:45.059380 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:45.059542 kubelet[2612]: E0517 00:35:45.059486 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:45.059636 kubelet[2612]: E0517 00:35:45.059621 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:45.059691 kubelet[2612]: W0517 00:35:45.059637 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:45.059691 kubelet[2612]: E0517 00:35:45.059654 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:45.059984 kubelet[2612]: E0517 00:35:45.059967 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:45.060062 kubelet[2612]: W0517 00:35:45.059983 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:45.060062 kubelet[2612]: E0517 00:35:45.060002 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:45.060503 kubelet[2612]: E0517 00:35:45.060464 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:45.060503 kubelet[2612]: W0517 00:35:45.060481 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:45.060503 kubelet[2612]: E0517 00:35:45.060498 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:45.060788 kubelet[2612]: E0517 00:35:45.060769 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:45.060788 kubelet[2612]: W0517 00:35:45.060788 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:45.060903 kubelet[2612]: E0517 00:35:45.060802 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:45.067488 kubelet[2612]: E0517 00:35:45.067453 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:45.067488 kubelet[2612]: W0517 00:35:45.067483 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:45.067765 kubelet[2612]: E0517 00:35:45.067511 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:45.068384 kubelet[2612]: E0517 00:35:45.068356 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:45.068384 kubelet[2612]: W0517 00:35:45.068382 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:45.068560 kubelet[2612]: E0517 00:35:45.068404 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:45.240000 audit[2477]: AVC avc: denied { watch } for pid=2477 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c831,c866 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:45.240000 audit[2477]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00dbc5cb0 a2=fc6 a3=0 items=0 ppid=2305 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c831,c866 key=(null) May 17 00:35:45.240000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32392E323437002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:35:45.242000 audit[2477]: AVC avc: denied { watch } for pid=2477 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c831,c866 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:45.242000 audit[2477]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00dbc5d10 a2=fc6 a3=0 items=0 ppid=2305 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c831,c866 key=(null) May 17 00:35:45.242000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32392E323437002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:35:45.268000 audit[2477]: AVC avc: denied { watch } for pid=2477 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c831,c866 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:45.268000 audit[2477]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00829a240 a2=fc6 a3=0 items=0 ppid=2305 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c831,c866 key=(null) May 17 00:35:45.268000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32392E323437002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:35:45.269000 audit[2477]: AVC avc: denied { watch } for pid=2477 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c831,c866 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:45.269000 audit[2477]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00ddc3da0 a2=fc6 a3=0 items=0 ppid=2305 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c831,c866 key=(null) May 17 00:35:45.269000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32392E323437002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:35:45.380000 audit[2477]: AVC avc: denied { watch } for pid=2477 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c831,c866 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:45.380000 audit[2477]: AVC avc: denied { watch } for pid=2477 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c831,c866 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:45.380000 audit[2477]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c00dfaa6f0 a2=fc6 a3=0 items=0 ppid=2305 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c831,c866 key=(null) May 17 00:35:45.380000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32392E323437002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:35:45.380000 audit[2477]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00829a800 a2=fc6 a3=0 items=0 ppid=2305 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c831,c866 key=(null) May 17 00:35:45.380000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32392E323437002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:35:45.657082 systemd[1]: run-containerd-runc-k8s.io-579ae3b6ceb020e67f74435a7fbe865c02f618ba97115d9b92527090a9d1f08a-runc.nNWRAI.mount: Deactivated successfully. May 17 00:35:45.817428 kubelet[2612]: E0517 00:35:45.817383 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-z4dbv" podUID="125bc07b-a5e7-420d-bbe5-934e8bac8b88" May 17 00:35:45.938471 env[1754]: time="2025-05-17T00:35:45.938349476Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:45.942894 env[1754]: time="2025-05-17T00:35:45.942658624Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:45.945742 env[1754]: time="2025-05-17T00:35:45.945684260Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:45.948394 env[1754]: time="2025-05-17T00:35:45.948352117Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:ce76dd87f11d3fd0054c35ad2e0e9f833748d007f77a9bfe859d0ddcb66fcb2c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:45.949145 env[1754]: time="2025-05-17T00:35:45.949106779Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\" returns image reference \"sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676\"" May 17 00:35:45.951985 env[1754]: time="2025-05-17T00:35:45.951331601Z" level=info msg="CreateContainer within sandbox \"13d6a3e7831fd018079bee1376ef31e23ed628c2f1cc34d7a6e180f66ed207fa\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 17 00:35:45.979906 env[1754]: time="2025-05-17T00:35:45.979830181Z" level=info msg="CreateContainer within sandbox \"13d6a3e7831fd018079bee1376ef31e23ed628c2f1cc34d7a6e180f66ed207fa\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"ad890ccbb9a4896f12e47c93a246f14d75bb821356d16c62f417276d8e16764b\"" May 17 00:35:45.982468 env[1754]: time="2025-05-17T00:35:45.980690545Z" level=info msg="StartContainer for \"ad890ccbb9a4896f12e47c93a246f14d75bb821356d16c62f417276d8e16764b\"" May 17 00:35:46.044666 systemd[1]: run-containerd-runc-k8s.io-ad890ccbb9a4896f12e47c93a246f14d75bb821356d16c62f417276d8e16764b-runc.aA9hMO.mount: Deactivated successfully. May 17 00:35:46.057544 systemd[1]: Started cri-containerd-ad890ccbb9a4896f12e47c93a246f14d75bb821356d16c62f417276d8e16764b.scope. May 17 00:35:46.063324 kubelet[2612]: I0517 00:35:46.062321 2612 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-5fd64f6478-74lvz" podStartSLOduration=2.34772596 podStartE2EDuration="5.062297693s" podCreationTimestamp="2025-05-17 00:35:41 +0000 UTC" firstStartedPulling="2025-05-17 00:35:41.924619165 +0000 UTC m=+52.310511486" lastFinishedPulling="2025-05-17 00:35:44.639190912 +0000 UTC m=+55.025083219" observedRunningTime="2025-05-17 00:35:45.067338433 +0000 UTC m=+55.453230764" watchObservedRunningTime="2025-05-17 00:35:46.062297693 +0000 UTC m=+56.448190020" May 17 00:35:46.063324 kubelet[2612]: E0517 00:35:46.063279 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:46.066347 kubelet[2612]: W0517 00:35:46.063301 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:46.066347 kubelet[2612]: E0517 00:35:46.065795 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:46.066846 kubelet[2612]: E0517 00:35:46.066660 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:46.066846 kubelet[2612]: W0517 00:35:46.066688 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:46.066846 kubelet[2612]: E0517 00:35:46.066743 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:46.067220 kubelet[2612]: E0517 00:35:46.067208 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:46.067312 kubelet[2612]: W0517 00:35:46.067299 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:46.067504 kubelet[2612]: E0517 00:35:46.067396 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:46.067755 kubelet[2612]: E0517 00:35:46.067743 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:46.067865 kubelet[2612]: W0517 00:35:46.067852 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:46.067965 kubelet[2612]: E0517 00:35:46.067953 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:46.068333 kubelet[2612]: E0517 00:35:46.068321 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:46.068443 kubelet[2612]: W0517 00:35:46.068428 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:46.068543 kubelet[2612]: E0517 00:35:46.068530 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:46.069784 kubelet[2612]: E0517 00:35:46.069769 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:46.069920 kubelet[2612]: W0517 00:35:46.069905 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:46.070017 kubelet[2612]: E0517 00:35:46.070003 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:46.070647 kubelet[2612]: E0517 00:35:46.070632 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:46.070793 kubelet[2612]: W0517 00:35:46.070778 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:46.070885 kubelet[2612]: E0517 00:35:46.070873 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:46.071191 kubelet[2612]: E0517 00:35:46.071178 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:46.071303 kubelet[2612]: W0517 00:35:46.071289 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:46.071395 kubelet[2612]: E0517 00:35:46.071382 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:46.071786 kubelet[2612]: E0517 00:35:46.071772 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:46.071893 kubelet[2612]: W0517 00:35:46.071879 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:46.071969 kubelet[2612]: E0517 00:35:46.071958 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:46.072249 kubelet[2612]: E0517 00:35:46.072237 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:46.072344 kubelet[2612]: W0517 00:35:46.072332 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:46.072426 kubelet[2612]: E0517 00:35:46.072413 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:46.072690 kubelet[2612]: E0517 00:35:46.072678 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:46.072814 kubelet[2612]: W0517 00:35:46.072800 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:46.072892 kubelet[2612]: E0517 00:35:46.072879 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:46.073180 kubelet[2612]: E0517 00:35:46.073168 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:46.073264 kubelet[2612]: W0517 00:35:46.073253 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:46.073338 kubelet[2612]: E0517 00:35:46.073326 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:46.073784 kubelet[2612]: E0517 00:35:46.073771 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:46.073888 kubelet[2612]: W0517 00:35:46.073875 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:46.073968 kubelet[2612]: E0517 00:35:46.073957 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:46.074237 kubelet[2612]: E0517 00:35:46.074226 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:46.074319 kubelet[2612]: W0517 00:35:46.074308 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:46.074386 kubelet[2612]: E0517 00:35:46.074375 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:46.074778 kubelet[2612]: E0517 00:35:46.074765 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:46.075020 kubelet[2612]: W0517 00:35:46.075004 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:46.075108 kubelet[2612]: E0517 00:35:46.075096 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:46.075595 kubelet[2612]: E0517 00:35:46.075582 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:46.076205 kubelet[2612]: W0517 00:35:46.076190 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:46.076685 kubelet[2612]: E0517 00:35:46.076667 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:46.078179 kubelet[2612]: E0517 00:35:46.078166 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:46.078766 kubelet[2612]: W0517 00:35:46.078746 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:46.078879 kubelet[2612]: E0517 00:35:46.078865 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:46.079312 kubelet[2612]: E0517 00:35:46.079298 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:46.079463 kubelet[2612]: W0517 00:35:46.079447 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:46.079578 kubelet[2612]: E0517 00:35:46.079558 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:46.079924 kubelet[2612]: E0517 00:35:46.079911 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:46.080027 kubelet[2612]: W0517 00:35:46.080012 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:46.080115 kubelet[2612]: E0517 00:35:46.080103 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:46.080474 kubelet[2612]: E0517 00:35:46.080462 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:46.080564 kubelet[2612]: W0517 00:35:46.080552 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:46.080663 kubelet[2612]: E0517 00:35:46.080651 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:46.080978 kubelet[2612]: E0517 00:35:46.080966 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:46.081065 kubelet[2612]: W0517 00:35:46.081052 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:46.081144 kubelet[2612]: E0517 00:35:46.081131 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:46.081469 kubelet[2612]: E0517 00:35:46.081456 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:46.081554 kubelet[2612]: W0517 00:35:46.081542 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:46.081633 kubelet[2612]: E0517 00:35:46.081622 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:46.081996 kubelet[2612]: E0517 00:35:46.081982 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:46.082096 kubelet[2612]: W0517 00:35:46.082083 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:46.082174 kubelet[2612]: E0517 00:35:46.082163 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:46.082784 kubelet[2612]: E0517 00:35:46.082768 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:46.082857 kubelet[2612]: W0517 00:35:46.082784 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:46.082857 kubelet[2612]: E0517 00:35:46.082804 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:46.083142 kubelet[2612]: E0517 00:35:46.083129 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:46.083242 kubelet[2612]: W0517 00:35:46.083228 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:46.083418 kubelet[2612]: E0517 00:35:46.083403 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:46.084041 kubelet[2612]: E0517 00:35:46.084030 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:46.084132 kubelet[2612]: W0517 00:35:46.084119 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:46.084310 kubelet[2612]: E0517 00:35:46.084296 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:46.084526 kubelet[2612]: E0517 00:35:46.084514 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:46.084610 kubelet[2612]: W0517 00:35:46.084597 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:46.084747 kubelet[2612]: E0517 00:35:46.084730 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:46.085023 kubelet[2612]: E0517 00:35:46.085012 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:46.085108 kubelet[2612]: W0517 00:35:46.085095 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:46.085188 kubelet[2612]: E0517 00:35:46.085177 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:46.085478 kubelet[2612]: E0517 00:35:46.085466 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:46.085566 kubelet[2612]: W0517 00:35:46.085554 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:46.085648 kubelet[2612]: E0517 00:35:46.085637 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:46.086015 kubelet[2612]: E0517 00:35:46.086003 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:46.086102 kubelet[2612]: W0517 00:35:46.086090 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:46.086182 kubelet[2612]: E0517 00:35:46.086171 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:46.087133 kubelet[2612]: E0517 00:35:46.087118 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:46.087237 kubelet[2612]: W0517 00:35:46.087224 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:46.087329 kubelet[2612]: E0517 00:35:46.087317 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:46.089664 kubelet[2612]: E0517 00:35:46.089644 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:46.089815 kubelet[2612]: W0517 00:35:46.089800 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:46.089921 kubelet[2612]: E0517 00:35:46.089907 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:46.090278 kubelet[2612]: E0517 00:35:46.090262 2612 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:46.090399 kubelet[2612]: W0517 00:35:46.090380 2612 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:46.090488 kubelet[2612]: E0517 00:35:46.090473 2612 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:46.101000 audit[3574]: NETFILTER_CFG table=filter:99 family=2 entries=21 op=nft_register_rule pid=3574 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:46.101000 audit[3574]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffcd41c6280 a2=0 a3=7ffcd41c626c items=0 ppid=2984 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:46.101000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:46.103000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:46.103000 audit[3522]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f6a54297298 items=0 ppid=3407 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:46.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164383930636362623961343839366631326534376339336132343666 May 17 00:35:46.103000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:46.103000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:46.103000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:46.103000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:46.103000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:46.103000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:46.103000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:46.103000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:46.103000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:46.103000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:46.103000 audit: BPF prog-id=136 op=LOAD May 17 00:35:46.103000 audit[3522]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0003c0698 items=0 ppid=3407 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:46.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164383930636362623961343839366631326534376339336132343666 May 17 00:35:46.103000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:46.103000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:46.103000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:46.103000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:46.103000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:46.103000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:46.103000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:46.103000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:46.103000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:46.103000 audit: BPF prog-id=137 op=LOAD May 17 00:35:46.103000 audit[3522]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0003c06e8 items=0 ppid=3407 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:46.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164383930636362623961343839366631326534376339336132343666 May 17 00:35:46.103000 audit: BPF prog-id=137 op=UNLOAD May 17 00:35:46.103000 audit: BPF prog-id=136 op=UNLOAD May 17 00:35:46.103000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:46.103000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:46.103000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:46.103000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:46.103000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:46.103000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:46.103000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:46.103000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:46.103000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:46.103000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:46.103000 audit: BPF prog-id=138 op=LOAD May 17 00:35:46.103000 audit[3522]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0003c0778 items=0 ppid=3407 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:46.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164383930636362623961343839366631326534376339336132343666 May 17 00:35:46.107000 audit[3574]: NETFILTER_CFG table=nat:100 family=2 entries=19 op=nft_register_chain pid=3574 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:46.107000 audit[3574]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffcd41c6280 a2=0 a3=7ffcd41c626c items=0 ppid=2984 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:46.107000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:46.124529 env[1754]: time="2025-05-17T00:35:46.124428779Z" level=info msg="StartContainer for \"ad890ccbb9a4896f12e47c93a246f14d75bb821356d16c62f417276d8e16764b\" returns successfully" May 17 00:35:46.137094 systemd[1]: cri-containerd-ad890ccbb9a4896f12e47c93a246f14d75bb821356d16c62f417276d8e16764b.scope: Deactivated successfully. May 17 00:35:46.139000 audit: BPF prog-id=138 op=UNLOAD May 17 00:35:46.337414 env[1754]: time="2025-05-17T00:35:46.337299074Z" level=info msg="shim disconnected" id=ad890ccbb9a4896f12e47c93a246f14d75bb821356d16c62f417276d8e16764b May 17 00:35:46.337414 env[1754]: time="2025-05-17T00:35:46.337344404Z" level=warning msg="cleaning up after shim disconnected" id=ad890ccbb9a4896f12e47c93a246f14d75bb821356d16c62f417276d8e16764b namespace=k8s.io May 17 00:35:46.337414 env[1754]: time="2025-05-17T00:35:46.337354189Z" level=info msg="cleaning up dead shim" May 17 00:35:46.351344 env[1754]: time="2025-05-17T00:35:46.351296546Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:35:46Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3596 runtime=io.containerd.runc.v2\n" May 17 00:35:46.657309 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ad890ccbb9a4896f12e47c93a246f14d75bb821356d16c62f417276d8e16764b-rootfs.mount: Deactivated successfully. May 17 00:35:47.026306 env[1754]: time="2025-05-17T00:35:47.026190295Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\"" May 17 00:35:47.817739 kubelet[2612]: E0517 00:35:47.817214 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-z4dbv" podUID="125bc07b-a5e7-420d-bbe5-934e8bac8b88" May 17 00:35:49.817185 kubelet[2612]: E0517 00:35:49.817138 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-z4dbv" podUID="125bc07b-a5e7-420d-bbe5-934e8bac8b88" May 17 00:35:50.948822 env[1754]: time="2025-05-17T00:35:50.948697322Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:50.955146 env[1754]: time="2025-05-17T00:35:50.955104362Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:50.956831 env[1754]: time="2025-05-17T00:35:50.956789584Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:50.959176 env[1754]: time="2025-05-17T00:35:50.959130012Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:3dd06656abdc03fbd51782d5f6fe4d70e6825a1c0c5bce2a165bbd2ff9e0f7df,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:50.959801 env[1754]: time="2025-05-17T00:35:50.959762405Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\" returns image reference \"sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185\"" May 17 00:35:50.973744 env[1754]: time="2025-05-17T00:35:50.973689279Z" level=info msg="CreateContainer within sandbox \"13d6a3e7831fd018079bee1376ef31e23ed628c2f1cc34d7a6e180f66ed207fa\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 17 00:35:50.989491 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2440942513.mount: Deactivated successfully. May 17 00:35:51.001643 env[1754]: time="2025-05-17T00:35:51.001576380Z" level=info msg="CreateContainer within sandbox \"13d6a3e7831fd018079bee1376ef31e23ed628c2f1cc34d7a6e180f66ed207fa\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"8c67c80998183235321841917e84af26841b333bf680be5b29665fde83190581\"" May 17 00:35:51.004552 env[1754]: time="2025-05-17T00:35:51.002642240Z" level=info msg="StartContainer for \"8c67c80998183235321841917e84af26841b333bf680be5b29665fde83190581\"" May 17 00:35:51.044245 systemd[1]: Started cri-containerd-8c67c80998183235321841917e84af26841b333bf680be5b29665fde83190581.scope. May 17 00:35:51.072107 kernel: kauditd_printk_skb: 241 callbacks suppressed May 17 00:35:51.072358 kernel: audit: type=1400 audit(1747442151.063:1028): avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:51.063000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:51.079846 kernel: audit: type=1300 audit(1747442151.063:1028): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f1784daa7c8 items=0 ppid=3407 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:51.063000 audit[3622]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f1784daa7c8 items=0 ppid=3407 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:51.087041 kernel: audit: type=1327 audit(1747442151.063:1028): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863363763383039393831383332333533323138343139313765383461 May 17 00:35:51.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863363763383039393831383332333533323138343139313765383461 May 17 00:35:51.092555 kernel: audit: type=1400 audit(1747442151.063:1029): avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:51.063000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:51.063000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:51.098874 kernel: audit: type=1400 audit(1747442151.063:1029): avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:51.063000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:51.109077 kernel: audit: type=1400 audit(1747442151.063:1029): avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:51.109174 kernel: audit: type=1400 audit(1747442151.063:1029): avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:51.063000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:51.111811 kernel: audit: type=1400 audit(1747442151.063:1029): avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:51.063000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:51.114718 kernel: audit: type=1400 audit(1747442151.063:1029): avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:51.063000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:51.063000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:51.125463 env[1754]: time="2025-05-17T00:35:51.125408247Z" level=info msg="StartContainer for \"8c67c80998183235321841917e84af26841b333bf680be5b29665fde83190581\" returns successfully" May 17 00:35:51.063000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:51.063000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:51.125726 kernel: audit: type=1400 audit(1747442151.063:1029): avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:51.063000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:51.063000 audit: BPF prog-id=139 op=LOAD May 17 00:35:51.063000 audit[3622]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003c4208 items=0 ppid=3407 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:51.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863363763383039393831383332333533323138343139313765383461 May 17 00:35:51.066000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:51.066000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:51.066000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:51.066000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:51.066000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:51.066000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:51.066000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:51.066000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:51.066000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:51.066000 audit: BPF prog-id=140 op=LOAD May 17 00:35:51.066000 audit[3622]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003c4258 items=0 ppid=3407 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:51.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863363763383039393831383332333533323138343139313765383461 May 17 00:35:51.071000 audit: BPF prog-id=140 op=UNLOAD May 17 00:35:51.071000 audit: BPF prog-id=139 op=UNLOAD May 17 00:35:51.071000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:51.071000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:51.071000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:51.071000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:51.071000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:51.071000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:51.071000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:51.071000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:51.071000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:51.071000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:51.071000 audit: BPF prog-id=141 op=LOAD May 17 00:35:51.071000 audit[3622]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003c42e8 items=0 ppid=3407 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:51.071000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863363763383039393831383332333533323138343139313765383461 May 17 00:35:51.817277 kubelet[2612]: E0517 00:35:51.817223 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-z4dbv" podUID="125bc07b-a5e7-420d-bbe5-934e8bac8b88" May 17 00:35:52.199839 env[1754]: time="2025-05-17T00:35:52.199772342Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:35:52.203978 systemd[1]: cri-containerd-8c67c80998183235321841917e84af26841b333bf680be5b29665fde83190581.scope: Deactivated successfully. May 17 00:35:52.207000 audit: BPF prog-id=141 op=UNLOAD May 17 00:35:52.231930 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-8c67c80998183235321841917e84af26841b333bf680be5b29665fde83190581-rootfs.mount: Deactivated successfully. May 17 00:35:52.251379 kubelet[2612]: I0517 00:35:52.239810 2612 kubelet_node_status.go:488] "Fast updating node status as it just became ready" May 17 00:35:52.253941 env[1754]: time="2025-05-17T00:35:52.253892257Z" level=info msg="shim disconnected" id=8c67c80998183235321841917e84af26841b333bf680be5b29665fde83190581 May 17 00:35:52.253941 env[1754]: time="2025-05-17T00:35:52.253938821Z" level=warning msg="cleaning up after shim disconnected" id=8c67c80998183235321841917e84af26841b333bf680be5b29665fde83190581 namespace=k8s.io May 17 00:35:52.254134 env[1754]: time="2025-05-17T00:35:52.253955964Z" level=info msg="cleaning up dead shim" May 17 00:35:52.271439 env[1754]: time="2025-05-17T00:35:52.271359960Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:35:52Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3661 runtime=io.containerd.runc.v2\n" May 17 00:35:52.312093 systemd[1]: Created slice kubepods-burstable-pod2a2f6310_2a87_41d3_811a_8205ae62507b.slice. May 17 00:35:52.320617 systemd[1]: Created slice kubepods-burstable-podf23ec894_6dad_4109_907f_3f5a4907b516.slice. May 17 00:35:52.331024 kubelet[2612]: I0517 00:35:52.330485 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/a509d34b-b31f-468b-b6a5-303b94e9422a-calico-apiserver-certs\") pod \"calico-apiserver-7fb9df588d-hlgc9\" (UID: \"a509d34b-b31f-468b-b6a5-303b94e9422a\") " pod="calico-apiserver/calico-apiserver-7fb9df588d-hlgc9" May 17 00:35:52.331024 kubelet[2612]: I0517 00:35:52.330533 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zkzhf\" (UniqueName: \"kubernetes.io/projected/df01dd5f-5ff2-409d-b1ac-3ddcb924c138-kube-api-access-zkzhf\") pod \"calico-kube-controllers-6cbb479df8-qsnz5\" (UID: \"df01dd5f-5ff2-409d-b1ac-3ddcb924c138\") " pod="calico-system/calico-kube-controllers-6cbb479df8-qsnz5" May 17 00:35:52.331024 kubelet[2612]: I0517 00:35:52.330554 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5zrff\" (UniqueName: \"kubernetes.io/projected/f23ec894-6dad-4109-907f-3f5a4907b516-kube-api-access-5zrff\") pod \"coredns-7c65d6cfc9-k5zt9\" (UID: \"f23ec894-6dad-4109-907f-3f5a4907b516\") " pod="kube-system/coredns-7c65d6cfc9-k5zt9" May 17 00:35:52.331024 kubelet[2612]: I0517 00:35:52.330574 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/2a2f6310-2a87-41d3-811a-8205ae62507b-config-volume\") pod \"coredns-7c65d6cfc9-ghjvq\" (UID: \"2a2f6310-2a87-41d3-811a-8205ae62507b\") " pod="kube-system/coredns-7c65d6cfc9-ghjvq" May 17 00:35:52.331024 kubelet[2612]: I0517 00:35:52.330592 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kxp4g\" (UniqueName: \"kubernetes.io/projected/2a2f6310-2a87-41d3-811a-8205ae62507b-kube-api-access-kxp4g\") pod \"coredns-7c65d6cfc9-ghjvq\" (UID: \"2a2f6310-2a87-41d3-811a-8205ae62507b\") " pod="kube-system/coredns-7c65d6cfc9-ghjvq" May 17 00:35:52.331270 kubelet[2612]: I0517 00:35:52.330612 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/df01dd5f-5ff2-409d-b1ac-3ddcb924c138-tigera-ca-bundle\") pod \"calico-kube-controllers-6cbb479df8-qsnz5\" (UID: \"df01dd5f-5ff2-409d-b1ac-3ddcb924c138\") " pod="calico-system/calico-kube-controllers-6cbb479df8-qsnz5" May 17 00:35:52.331270 kubelet[2612]: I0517 00:35:52.330628 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b130376b-e592-4257-8150-fa1595d1cccd-goldmane-ca-bundle\") pod \"goldmane-8f77d7b6c-z92z5\" (UID: \"b130376b-e592-4257-8150-fa1595d1cccd\") " pod="calico-system/goldmane-8f77d7b6c-z92z5" May 17 00:35:52.331270 kubelet[2612]: I0517 00:35:52.330646 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-29q64\" (UniqueName: \"kubernetes.io/projected/0aab84c3-8540-487d-9d30-cf21cf4a5388-kube-api-access-29q64\") pod \"whisker-6bfc64555d-67wfk\" (UID: \"0aab84c3-8540-487d-9d30-cf21cf4a5388\") " pod="calico-system/whisker-6bfc64555d-67wfk" May 17 00:35:52.331270 kubelet[2612]: I0517 00:35:52.330683 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config\" (UniqueName: \"kubernetes.io/configmap/b130376b-e592-4257-8150-fa1595d1cccd-config\") pod \"goldmane-8f77d7b6c-z92z5\" (UID: \"b130376b-e592-4257-8150-fa1595d1cccd\") " pod="calico-system/goldmane-8f77d7b6c-z92z5" May 17 00:35:52.331270 kubelet[2612]: I0517 00:35:52.330714 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/68cbb9bc-cdf9-4a9a-ac87-6f23197e12aa-calico-apiserver-certs\") pod \"calico-apiserver-7fb9df588d-8ffw4\" (UID: \"68cbb9bc-cdf9-4a9a-ac87-6f23197e12aa\") " pod="calico-apiserver/calico-apiserver-7fb9df588d-8ffw4" May 17 00:35:52.331406 kubelet[2612]: I0517 00:35:52.330740 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cjx72\" (UniqueName: \"kubernetes.io/projected/68cbb9bc-cdf9-4a9a-ac87-6f23197e12aa-kube-api-access-cjx72\") pod \"calico-apiserver-7fb9df588d-8ffw4\" (UID: \"68cbb9bc-cdf9-4a9a-ac87-6f23197e12aa\") " pod="calico-apiserver/calico-apiserver-7fb9df588d-8ffw4" May 17 00:35:52.331406 kubelet[2612]: I0517 00:35:52.330767 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-x58tm\" (UniqueName: \"kubernetes.io/projected/a509d34b-b31f-468b-b6a5-303b94e9422a-kube-api-access-x58tm\") pod \"calico-apiserver-7fb9df588d-hlgc9\" (UID: \"a509d34b-b31f-468b-b6a5-303b94e9422a\") " pod="calico-apiserver/calico-apiserver-7fb9df588d-hlgc9" May 17 00:35:52.331406 kubelet[2612]: I0517 00:35:52.330790 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0aab84c3-8540-487d-9d30-cf21cf4a5388-whisker-ca-bundle\") pod \"whisker-6bfc64555d-67wfk\" (UID: \"0aab84c3-8540-487d-9d30-cf21cf4a5388\") " pod="calico-system/whisker-6bfc64555d-67wfk" May 17 00:35:52.331406 kubelet[2612]: I0517 00:35:52.330820 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-h4l9s\" (UniqueName: \"kubernetes.io/projected/b130376b-e592-4257-8150-fa1595d1cccd-kube-api-access-h4l9s\") pod \"goldmane-8f77d7b6c-z92z5\" (UID: \"b130376b-e592-4257-8150-fa1595d1cccd\") " pod="calico-system/goldmane-8f77d7b6c-z92z5" May 17 00:35:52.331406 kubelet[2612]: I0517 00:35:52.330842 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/f23ec894-6dad-4109-907f-3f5a4907b516-config-volume\") pod \"coredns-7c65d6cfc9-k5zt9\" (UID: \"f23ec894-6dad-4109-907f-3f5a4907b516\") " pod="kube-system/coredns-7c65d6cfc9-k5zt9" May 17 00:35:52.331540 kubelet[2612]: I0517 00:35:52.330858 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-key-pair\" (UniqueName: \"kubernetes.io/secret/b130376b-e592-4257-8150-fa1595d1cccd-goldmane-key-pair\") pod \"goldmane-8f77d7b6c-z92z5\" (UID: \"b130376b-e592-4257-8150-fa1595d1cccd\") " pod="calico-system/goldmane-8f77d7b6c-z92z5" May 17 00:35:52.331540 kubelet[2612]: I0517 00:35:52.330876 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/0aab84c3-8540-487d-9d30-cf21cf4a5388-whisker-backend-key-pair\") pod \"whisker-6bfc64555d-67wfk\" (UID: \"0aab84c3-8540-487d-9d30-cf21cf4a5388\") " pod="calico-system/whisker-6bfc64555d-67wfk" May 17 00:35:52.333652 systemd[1]: Created slice kubepods-besteffort-pod0aab84c3_8540_487d_9d30_cf21cf4a5388.slice. May 17 00:35:52.343658 systemd[1]: Created slice kubepods-besteffort-poda509d34b_b31f_468b_b6a5_303b94e9422a.slice. May 17 00:35:52.350536 systemd[1]: Created slice kubepods-besteffort-pod68cbb9bc_cdf9_4a9a_ac87_6f23197e12aa.slice. May 17 00:35:52.360107 systemd[1]: Created slice kubepods-besteffort-podb130376b_e592_4257_8150_fa1595d1cccd.slice. May 17 00:35:52.371143 systemd[1]: Created slice kubepods-besteffort-poddf01dd5f_5ff2_409d_b1ac_3ddcb924c138.slice. May 17 00:35:52.620602 env[1754]: time="2025-05-17T00:35:52.619212162Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-ghjvq,Uid:2a2f6310-2a87-41d3-811a-8205ae62507b,Namespace:kube-system,Attempt:0,}" May 17 00:35:52.630931 env[1754]: time="2025-05-17T00:35:52.629912013Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-k5zt9,Uid:f23ec894-6dad-4109-907f-3f5a4907b516,Namespace:kube-system,Attempt:0,}" May 17 00:35:52.645876 env[1754]: time="2025-05-17T00:35:52.645837533Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-6bfc64555d-67wfk,Uid:0aab84c3-8540-487d-9d30-cf21cf4a5388,Namespace:calico-system,Attempt:0,}" May 17 00:35:52.649390 env[1754]: time="2025-05-17T00:35:52.649356619Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7fb9df588d-hlgc9,Uid:a509d34b-b31f-468b-b6a5-303b94e9422a,Namespace:calico-apiserver,Attempt:0,}" May 17 00:35:52.657879 env[1754]: time="2025-05-17T00:35:52.657837370Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7fb9df588d-8ffw4,Uid:68cbb9bc-cdf9-4a9a-ac87-6f23197e12aa,Namespace:calico-apiserver,Attempt:0,}" May 17 00:35:52.668868 env[1754]: time="2025-05-17T00:35:52.668824180Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-8f77d7b6c-z92z5,Uid:b130376b-e592-4257-8150-fa1595d1cccd,Namespace:calico-system,Attempt:0,}" May 17 00:35:52.678604 env[1754]: time="2025-05-17T00:35:52.678564623Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6cbb479df8-qsnz5,Uid:df01dd5f-5ff2-409d-b1ac-3ddcb924c138,Namespace:calico-system,Attempt:0,}" May 17 00:35:52.752000 audit[2468]: AVC avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:52.752000 audit[2468]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0021e7a00 a2=fc6 a3=0 items=0 ppid=2314 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 key=(null) May 17 00:35:52.752000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:35:52.755000 audit[2468]: AVC avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:52.755000 audit[2468]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001761080 a2=fc6 a3=0 items=0 ppid=2314 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 key=(null) May 17 00:35:52.755000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:35:52.756000 audit[2468]: AVC avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:52.756000 audit[2468]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0017610a0 a2=fc6 a3=0 items=0 ppid=2314 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 key=(null) May 17 00:35:52.756000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:35:52.756000 audit[2468]: AVC avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:52.756000 audit[2468]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0017610c0 a2=fc6 a3=0 items=0 ppid=2314 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 key=(null) May 17 00:35:52.756000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:35:53.062139 env[1754]: time="2025-05-17T00:35:53.055671839Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\"" May 17 00:35:53.119437 env[1754]: time="2025-05-17T00:35:53.119356679Z" level=error msg="Failed to destroy network for sandbox \"eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:53.120138 env[1754]: time="2025-05-17T00:35:53.120079846Z" level=error msg="encountered an error cleaning up failed sandbox \"eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:53.120350 env[1754]: time="2025-05-17T00:35:53.120304701Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-6bfc64555d-67wfk,Uid:0aab84c3-8540-487d-9d30-cf21cf4a5388,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:53.130048 kubelet[2612]: E0517 00:35:53.128271 2612 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:53.134613 kubelet[2612]: E0517 00:35:53.133290 2612 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-6bfc64555d-67wfk" May 17 00:35:53.134613 kubelet[2612]: E0517 00:35:53.133373 2612 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-6bfc64555d-67wfk" May 17 00:35:53.134613 kubelet[2612]: E0517 00:35:53.133443 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"whisker-6bfc64555d-67wfk_calico-system(0aab84c3-8540-487d-9d30-cf21cf4a5388)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"whisker-6bfc64555d-67wfk_calico-system(0aab84c3-8540-487d-9d30-cf21cf4a5388)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-6bfc64555d-67wfk" podUID="0aab84c3-8540-487d-9d30-cf21cf4a5388" May 17 00:35:53.135345 env[1754]: time="2025-05-17T00:35:53.135262387Z" level=error msg="Failed to destroy network for sandbox \"01a750803899573c40be663805ebea2c6df21173762de1ba952840c22f39b59d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:53.136077 env[1754]: time="2025-05-17T00:35:53.136025749Z" level=error msg="encountered an error cleaning up failed sandbox \"01a750803899573c40be663805ebea2c6df21173762de1ba952840c22f39b59d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:53.136299 env[1754]: time="2025-05-17T00:35:53.136255888Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-ghjvq,Uid:2a2f6310-2a87-41d3-811a-8205ae62507b,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"01a750803899573c40be663805ebea2c6df21173762de1ba952840c22f39b59d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:53.136722 kubelet[2612]: E0517 00:35:53.136620 2612 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"01a750803899573c40be663805ebea2c6df21173762de1ba952840c22f39b59d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:53.136722 kubelet[2612]: E0517 00:35:53.136683 2612 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"01a750803899573c40be663805ebea2c6df21173762de1ba952840c22f39b59d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-ghjvq" May 17 00:35:53.137913 kubelet[2612]: E0517 00:35:53.136885 2612 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"01a750803899573c40be663805ebea2c6df21173762de1ba952840c22f39b59d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-ghjvq" May 17 00:35:53.137913 kubelet[2612]: E0517 00:35:53.136948 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7c65d6cfc9-ghjvq_kube-system(2a2f6310-2a87-41d3-811a-8205ae62507b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7c65d6cfc9-ghjvq_kube-system(2a2f6310-2a87-41d3-811a-8205ae62507b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"01a750803899573c40be663805ebea2c6df21173762de1ba952840c22f39b59d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-ghjvq" podUID="2a2f6310-2a87-41d3-811a-8205ae62507b" May 17 00:35:53.140837 env[1754]: time="2025-05-17T00:35:53.140788969Z" level=error msg="Failed to destroy network for sandbox \"36322bbbcc0124d74351a0e6d46426aeb908d4e2945ac931333b7e4a1868899b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:53.141382 env[1754]: time="2025-05-17T00:35:53.141341163Z" level=error msg="encountered an error cleaning up failed sandbox \"36322bbbcc0124d74351a0e6d46426aeb908d4e2945ac931333b7e4a1868899b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:53.141563 env[1754]: time="2025-05-17T00:35:53.141519210Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-k5zt9,Uid:f23ec894-6dad-4109-907f-3f5a4907b516,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"36322bbbcc0124d74351a0e6d46426aeb908d4e2945ac931333b7e4a1868899b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:53.142046 kubelet[2612]: E0517 00:35:53.141853 2612 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"36322bbbcc0124d74351a0e6d46426aeb908d4e2945ac931333b7e4a1868899b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:53.142046 kubelet[2612]: E0517 00:35:53.141911 2612 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"36322bbbcc0124d74351a0e6d46426aeb908d4e2945ac931333b7e4a1868899b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-k5zt9" May 17 00:35:53.142046 kubelet[2612]: E0517 00:35:53.141940 2612 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"36322bbbcc0124d74351a0e6d46426aeb908d4e2945ac931333b7e4a1868899b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-k5zt9" May 17 00:35:53.142327 kubelet[2612]: E0517 00:35:53.141991 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7c65d6cfc9-k5zt9_kube-system(f23ec894-6dad-4109-907f-3f5a4907b516)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7c65d6cfc9-k5zt9_kube-system(f23ec894-6dad-4109-907f-3f5a4907b516)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"36322bbbcc0124d74351a0e6d46426aeb908d4e2945ac931333b7e4a1868899b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-k5zt9" podUID="f23ec894-6dad-4109-907f-3f5a4907b516" May 17 00:35:53.144497 env[1754]: time="2025-05-17T00:35:53.144430981Z" level=error msg="Failed to destroy network for sandbox \"7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:53.145666 env[1754]: time="2025-05-17T00:35:53.145624437Z" level=error msg="encountered an error cleaning up failed sandbox \"7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:53.145986 env[1754]: time="2025-05-17T00:35:53.145924430Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6cbb479df8-qsnz5,Uid:df01dd5f-5ff2-409d-b1ac-3ddcb924c138,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:53.146613 kubelet[2612]: E0517 00:35:53.146406 2612 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:53.146613 kubelet[2612]: E0517 00:35:53.146473 2612 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6cbb479df8-qsnz5" May 17 00:35:53.146613 kubelet[2612]: E0517 00:35:53.146501 2612 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6cbb479df8-qsnz5" May 17 00:35:53.147022 kubelet[2612]: E0517 00:35:53.146550 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-6cbb479df8-qsnz5_calico-system(df01dd5f-5ff2-409d-b1ac-3ddcb924c138)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-6cbb479df8-qsnz5_calico-system(df01dd5f-5ff2-409d-b1ac-3ddcb924c138)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6cbb479df8-qsnz5" podUID="df01dd5f-5ff2-409d-b1ac-3ddcb924c138" May 17 00:35:53.155201 env[1754]: time="2025-05-17T00:35:53.155140850Z" level=error msg="Failed to destroy network for sandbox \"eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:53.156522 env[1754]: time="2025-05-17T00:35:53.156469375Z" level=error msg="encountered an error cleaning up failed sandbox \"eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:53.157880 env[1754]: time="2025-05-17T00:35:53.157779040Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7fb9df588d-hlgc9,Uid:a509d34b-b31f-468b-b6a5-303b94e9422a,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:53.159074 kubelet[2612]: E0517 00:35:53.158322 2612 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:53.159074 kubelet[2612]: E0517 00:35:53.158454 2612 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7fb9df588d-hlgc9" May 17 00:35:53.159074 kubelet[2612]: E0517 00:35:53.158485 2612 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7fb9df588d-hlgc9" May 17 00:35:53.159382 kubelet[2612]: E0517 00:35:53.158551 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7fb9df588d-hlgc9_calico-apiserver(a509d34b-b31f-468b-b6a5-303b94e9422a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7fb9df588d-hlgc9_calico-apiserver(a509d34b-b31f-468b-b6a5-303b94e9422a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7fb9df588d-hlgc9" podUID="a509d34b-b31f-468b-b6a5-303b94e9422a" May 17 00:35:53.167584 env[1754]: time="2025-05-17T00:35:53.167470720Z" level=error msg="Failed to destroy network for sandbox \"6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:53.168037 env[1754]: time="2025-05-17T00:35:53.167957437Z" level=error msg="encountered an error cleaning up failed sandbox \"6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:53.168152 env[1754]: time="2025-05-17T00:35:53.168032686Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7fb9df588d-8ffw4,Uid:68cbb9bc-cdf9-4a9a-ac87-6f23197e12aa,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:53.170935 kubelet[2612]: E0517 00:35:53.168536 2612 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:53.170935 kubelet[2612]: E0517 00:35:53.168629 2612 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7fb9df588d-8ffw4" May 17 00:35:53.170935 kubelet[2612]: E0517 00:35:53.168686 2612 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7fb9df588d-8ffw4" May 17 00:35:53.171377 kubelet[2612]: E0517 00:35:53.168770 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7fb9df588d-8ffw4_calico-apiserver(68cbb9bc-cdf9-4a9a-ac87-6f23197e12aa)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7fb9df588d-8ffw4_calico-apiserver(68cbb9bc-cdf9-4a9a-ac87-6f23197e12aa)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7fb9df588d-8ffw4" podUID="68cbb9bc-cdf9-4a9a-ac87-6f23197e12aa" May 17 00:35:53.177820 env[1754]: time="2025-05-17T00:35:53.177765426Z" level=error msg="Failed to destroy network for sandbox \"68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:53.178634 env[1754]: time="2025-05-17T00:35:53.178127511Z" level=error msg="encountered an error cleaning up failed sandbox \"68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:53.178634 env[1754]: time="2025-05-17T00:35:53.178189704Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-8f77d7b6c-z92z5,Uid:b130376b-e592-4257-8150-fa1595d1cccd,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:53.180363 kubelet[2612]: E0517 00:35:53.178445 2612 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:53.180363 kubelet[2612]: E0517 00:35:53.178515 2612 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-8f77d7b6c-z92z5" May 17 00:35:53.180363 kubelet[2612]: E0517 00:35:53.178546 2612 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-8f77d7b6c-z92z5" May 17 00:35:53.180531 kubelet[2612]: E0517 00:35:53.178616 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"goldmane-8f77d7b6c-z92z5_calico-system(b130376b-e592-4257-8150-fa1595d1cccd)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"goldmane-8f77d7b6c-z92z5_calico-system(b130376b-e592-4257-8150-fa1595d1cccd)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-8f77d7b6c-z92z5" podUID="b130376b-e592-4257-8150-fa1595d1cccd" May 17 00:35:53.823166 systemd[1]: Created slice kubepods-besteffort-pod125bc07b_a5e7_420d_bbe5_934e8bac8b88.slice. May 17 00:35:53.826002 env[1754]: time="2025-05-17T00:35:53.825958649Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-z4dbv,Uid:125bc07b-a5e7-420d-bbe5-934e8bac8b88,Namespace:calico-system,Attempt:0,}" May 17 00:35:53.913819 env[1754]: time="2025-05-17T00:35:53.913767107Z" level=error msg="Failed to destroy network for sandbox \"8afa79ac2027e2b14fc4d680f6c19595ccb9a6c6294cbb7f2c6bbb37c66223ae\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:53.917149 env[1754]: time="2025-05-17T00:35:53.917076982Z" level=error msg="encountered an error cleaning up failed sandbox \"8afa79ac2027e2b14fc4d680f6c19595ccb9a6c6294cbb7f2c6bbb37c66223ae\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:53.917396 env[1754]: time="2025-05-17T00:35:53.917349499Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-z4dbv,Uid:125bc07b-a5e7-420d-bbe5-934e8bac8b88,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8afa79ac2027e2b14fc4d680f6c19595ccb9a6c6294cbb7f2c6bbb37c66223ae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:53.918344 kubelet[2612]: E0517 00:35:53.917804 2612 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8afa79ac2027e2b14fc4d680f6c19595ccb9a6c6294cbb7f2c6bbb37c66223ae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:53.918344 kubelet[2612]: E0517 00:35:53.917894 2612 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8afa79ac2027e2b14fc4d680f6c19595ccb9a6c6294cbb7f2c6bbb37c66223ae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-z4dbv" May 17 00:35:53.918344 kubelet[2612]: E0517 00:35:53.917953 2612 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8afa79ac2027e2b14fc4d680f6c19595ccb9a6c6294cbb7f2c6bbb37c66223ae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-z4dbv" May 17 00:35:53.918581 kubelet[2612]: E0517 00:35:53.918008 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-z4dbv_calico-system(125bc07b-a5e7-420d-bbe5-934e8bac8b88)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-z4dbv_calico-system(125bc07b-a5e7-420d-bbe5-934e8bac8b88)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8afa79ac2027e2b14fc4d680f6c19595ccb9a6c6294cbb7f2c6bbb37c66223ae\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-z4dbv" podUID="125bc07b-a5e7-420d-bbe5-934e8bac8b88" May 17 00:35:53.918693 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-8afa79ac2027e2b14fc4d680f6c19595ccb9a6c6294cbb7f2c6bbb37c66223ae-shm.mount: Deactivated successfully. May 17 00:35:54.054248 kubelet[2612]: I0517 00:35:54.054216 2612 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37" May 17 00:35:54.058729 kubelet[2612]: I0517 00:35:54.058681 2612 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7" May 17 00:35:54.074128 kubelet[2612]: I0517 00:35:54.073353 2612 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="01a750803899573c40be663805ebea2c6df21173762de1ba952840c22f39b59d" May 17 00:35:54.076494 kubelet[2612]: I0517 00:35:54.076464 2612 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a" May 17 00:35:54.078974 kubelet[2612]: I0517 00:35:54.078947 2612 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d" May 17 00:35:54.082638 kubelet[2612]: I0517 00:35:54.082611 2612 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="36322bbbcc0124d74351a0e6d46426aeb908d4e2945ac931333b7e4a1868899b" May 17 00:35:54.085020 kubelet[2612]: I0517 00:35:54.084997 2612 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7" May 17 00:35:54.087324 kubelet[2612]: I0517 00:35:54.087298 2612 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8afa79ac2027e2b14fc4d680f6c19595ccb9a6c6294cbb7f2c6bbb37c66223ae" May 17 00:35:54.092040 env[1754]: time="2025-05-17T00:35:54.090584629Z" level=info msg="StopPodSandbox for \"01a750803899573c40be663805ebea2c6df21173762de1ba952840c22f39b59d\"" May 17 00:35:54.092040 env[1754]: time="2025-05-17T00:35:54.090909715Z" level=info msg="StopPodSandbox for \"eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37\"" May 17 00:35:54.092040 env[1754]: time="2025-05-17T00:35:54.091337116Z" level=info msg="StopPodSandbox for \"eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7\"" May 17 00:35:54.095974 env[1754]: time="2025-05-17T00:35:54.095935504Z" level=info msg="StopPodSandbox for \"8afa79ac2027e2b14fc4d680f6c19595ccb9a6c6294cbb7f2c6bbb37c66223ae\"" May 17 00:35:54.096887 env[1754]: time="2025-05-17T00:35:54.096854438Z" level=info msg="StopPodSandbox for \"68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a\"" May 17 00:35:54.097834 env[1754]: time="2025-05-17T00:35:54.097786140Z" level=info msg="StopPodSandbox for \"36322bbbcc0124d74351a0e6d46426aeb908d4e2945ac931333b7e4a1868899b\"" May 17 00:35:54.099164 env[1754]: time="2025-05-17T00:35:54.099101095Z" level=info msg="StopPodSandbox for \"7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d\"" May 17 00:35:54.099943 env[1754]: time="2025-05-17T00:35:54.099899760Z" level=info msg="StopPodSandbox for \"6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7\"" May 17 00:35:54.181609 env[1754]: time="2025-05-17T00:35:54.181544052Z" level=error msg="StopPodSandbox for \"01a750803899573c40be663805ebea2c6df21173762de1ba952840c22f39b59d\" failed" error="failed to destroy network for sandbox \"01a750803899573c40be663805ebea2c6df21173762de1ba952840c22f39b59d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:54.182209 kubelet[2612]: E0517 00:35:54.182151 2612 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"01a750803899573c40be663805ebea2c6df21173762de1ba952840c22f39b59d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="01a750803899573c40be663805ebea2c6df21173762de1ba952840c22f39b59d" May 17 00:35:54.182621 kubelet[2612]: E0517 00:35:54.182252 2612 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"01a750803899573c40be663805ebea2c6df21173762de1ba952840c22f39b59d"} May 17 00:35:54.182621 kubelet[2612]: E0517 00:35:54.182364 2612 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2a2f6310-2a87-41d3-811a-8205ae62507b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"01a750803899573c40be663805ebea2c6df21173762de1ba952840c22f39b59d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:35:54.182621 kubelet[2612]: E0517 00:35:54.182411 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2a2f6310-2a87-41d3-811a-8205ae62507b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"01a750803899573c40be663805ebea2c6df21173762de1ba952840c22f39b59d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-ghjvq" podUID="2a2f6310-2a87-41d3-811a-8205ae62507b" May 17 00:35:54.321490 env[1754]: time="2025-05-17T00:35:54.321435961Z" level=error msg="StopPodSandbox for \"68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a\" failed" error="failed to destroy network for sandbox \"68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:54.321871 env[1754]: time="2025-05-17T00:35:54.321426917Z" level=error msg="StopPodSandbox for \"eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37\" failed" error="failed to destroy network for sandbox \"eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:54.322329 kubelet[2612]: E0517 00:35:54.322118 2612 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a" May 17 00:35:54.322329 kubelet[2612]: E0517 00:35:54.322180 2612 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a"} May 17 00:35:54.323045 kubelet[2612]: E0517 00:35:54.322882 2612 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37" May 17 00:35:54.323045 kubelet[2612]: E0517 00:35:54.322930 2612 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37"} May 17 00:35:54.323045 kubelet[2612]: E0517 00:35:54.322972 2612 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a509d34b-b31f-468b-b6a5-303b94e9422a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:35:54.323045 kubelet[2612]: E0517 00:35:54.323004 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a509d34b-b31f-468b-b6a5-303b94e9422a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7fb9df588d-hlgc9" podUID="a509d34b-b31f-468b-b6a5-303b94e9422a" May 17 00:35:54.327582 kubelet[2612]: E0517 00:35:54.322229 2612 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b130376b-e592-4257-8150-fa1595d1cccd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:35:54.327582 kubelet[2612]: E0517 00:35:54.326097 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b130376b-e592-4257-8150-fa1595d1cccd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-8f77d7b6c-z92z5" podUID="b130376b-e592-4257-8150-fa1595d1cccd" May 17 00:35:54.328323 env[1754]: time="2025-05-17T00:35:54.328268554Z" level=error msg="StopPodSandbox for \"eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7\" failed" error="failed to destroy network for sandbox \"eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:54.328834 kubelet[2612]: E0517 00:35:54.328646 2612 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7" May 17 00:35:54.328834 kubelet[2612]: E0517 00:35:54.328696 2612 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7"} May 17 00:35:54.328834 kubelet[2612]: E0517 00:35:54.328753 2612 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0aab84c3-8540-487d-9d30-cf21cf4a5388\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:35:54.328834 kubelet[2612]: E0517 00:35:54.328784 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0aab84c3-8540-487d-9d30-cf21cf4a5388\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-6bfc64555d-67wfk" podUID="0aab84c3-8540-487d-9d30-cf21cf4a5388" May 17 00:35:54.336070 env[1754]: time="2025-05-17T00:35:54.336003362Z" level=error msg="StopPodSandbox for \"6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7\" failed" error="failed to destroy network for sandbox \"6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:54.336295 kubelet[2612]: E0517 00:35:54.336249 2612 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7" May 17 00:35:54.336393 kubelet[2612]: E0517 00:35:54.336307 2612 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7"} May 17 00:35:54.336393 kubelet[2612]: E0517 00:35:54.336353 2612 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"68cbb9bc-cdf9-4a9a-ac87-6f23197e12aa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:35:54.336528 kubelet[2612]: E0517 00:35:54.336391 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"68cbb9bc-cdf9-4a9a-ac87-6f23197e12aa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7fb9df588d-8ffw4" podUID="68cbb9bc-cdf9-4a9a-ac87-6f23197e12aa" May 17 00:35:54.341731 env[1754]: time="2025-05-17T00:35:54.341654545Z" level=error msg="StopPodSandbox for \"36322bbbcc0124d74351a0e6d46426aeb908d4e2945ac931333b7e4a1868899b\" failed" error="failed to destroy network for sandbox \"36322bbbcc0124d74351a0e6d46426aeb908d4e2945ac931333b7e4a1868899b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:54.341964 kubelet[2612]: E0517 00:35:54.341922 2612 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"36322bbbcc0124d74351a0e6d46426aeb908d4e2945ac931333b7e4a1868899b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="36322bbbcc0124d74351a0e6d46426aeb908d4e2945ac931333b7e4a1868899b" May 17 00:35:54.342062 kubelet[2612]: E0517 00:35:54.341985 2612 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"36322bbbcc0124d74351a0e6d46426aeb908d4e2945ac931333b7e4a1868899b"} May 17 00:35:54.342062 kubelet[2612]: E0517 00:35:54.342035 2612 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f23ec894-6dad-4109-907f-3f5a4907b516\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"36322bbbcc0124d74351a0e6d46426aeb908d4e2945ac931333b7e4a1868899b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:35:54.342203 kubelet[2612]: E0517 00:35:54.342065 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f23ec894-6dad-4109-907f-3f5a4907b516\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"36322bbbcc0124d74351a0e6d46426aeb908d4e2945ac931333b7e4a1868899b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-k5zt9" podUID="f23ec894-6dad-4109-907f-3f5a4907b516" May 17 00:35:54.344883 env[1754]: time="2025-05-17T00:35:54.344817545Z" level=error msg="StopPodSandbox for \"8afa79ac2027e2b14fc4d680f6c19595ccb9a6c6294cbb7f2c6bbb37c66223ae\" failed" error="failed to destroy network for sandbox \"8afa79ac2027e2b14fc4d680f6c19595ccb9a6c6294cbb7f2c6bbb37c66223ae\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:54.345119 kubelet[2612]: E0517 00:35:54.345069 2612 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8afa79ac2027e2b14fc4d680f6c19595ccb9a6c6294cbb7f2c6bbb37c66223ae\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8afa79ac2027e2b14fc4d680f6c19595ccb9a6c6294cbb7f2c6bbb37c66223ae" May 17 00:35:54.345211 kubelet[2612]: E0517 00:35:54.345129 2612 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8afa79ac2027e2b14fc4d680f6c19595ccb9a6c6294cbb7f2c6bbb37c66223ae"} May 17 00:35:54.345211 kubelet[2612]: E0517 00:35:54.345174 2612 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"125bc07b-a5e7-420d-bbe5-934e8bac8b88\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8afa79ac2027e2b14fc4d680f6c19595ccb9a6c6294cbb7f2c6bbb37c66223ae\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:35:54.345339 kubelet[2612]: E0517 00:35:54.345203 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"125bc07b-a5e7-420d-bbe5-934e8bac8b88\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8afa79ac2027e2b14fc4d680f6c19595ccb9a6c6294cbb7f2c6bbb37c66223ae\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-z4dbv" podUID="125bc07b-a5e7-420d-bbe5-934e8bac8b88" May 17 00:35:54.350135 env[1754]: time="2025-05-17T00:35:54.350072521Z" level=error msg="StopPodSandbox for \"7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d\" failed" error="failed to destroy network for sandbox \"7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:54.350349 kubelet[2612]: E0517 00:35:54.350301 2612 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d" May 17 00:35:54.350450 kubelet[2612]: E0517 00:35:54.350363 2612 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d"} May 17 00:35:54.350450 kubelet[2612]: E0517 00:35:54.350406 2612 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"df01dd5f-5ff2-409d-b1ac-3ddcb924c138\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:35:54.350572 kubelet[2612]: E0517 00:35:54.350442 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"df01dd5f-5ff2-409d-b1ac-3ddcb924c138\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6cbb479df8-qsnz5" podUID="df01dd5f-5ff2-409d-b1ac-3ddcb924c138" May 17 00:36:02.290493 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1207756384.mount: Deactivated successfully. May 17 00:36:02.432775 env[1754]: time="2025-05-17T00:36:02.432718706Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:02.445339 env[1754]: time="2025-05-17T00:36:02.445289277Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:02.453094 env[1754]: time="2025-05-17T00:36:02.453046259Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:02.456328 env[1754]: time="2025-05-17T00:36:02.456169461Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:7cb61ea47ca0a8e6d0526a42da4f1e399b37ccd13339d0776d272465cb7ee012,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:02.458480 env[1754]: time="2025-05-17T00:36:02.458407213Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\" returns image reference \"sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721\"" May 17 00:36:02.641251 env[1754]: time="2025-05-17T00:36:02.639979542Z" level=info msg="CreateContainer within sandbox \"13d6a3e7831fd018079bee1376ef31e23ed628c2f1cc34d7a6e180f66ed207fa\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 17 00:36:02.780368 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1339951178.mount: Deactivated successfully. May 17 00:36:02.848239 env[1754]: time="2025-05-17T00:36:02.848060293Z" level=info msg="CreateContainer within sandbox \"13d6a3e7831fd018079bee1376ef31e23ed628c2f1cc34d7a6e180f66ed207fa\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"2dc05c77b8a15a3750a1c62f783f96ae042785fc5722ed0b801e29addab7327b\"" May 17 00:36:02.862233 env[1754]: time="2025-05-17T00:36:02.862184497Z" level=info msg="StartContainer for \"2dc05c77b8a15a3750a1c62f783f96ae042785fc5722ed0b801e29addab7327b\"" May 17 00:36:02.920504 systemd[1]: Started cri-containerd-2dc05c77b8a15a3750a1c62f783f96ae042785fc5722ed0b801e29addab7327b.scope. May 17 00:36:02.963000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.984590 kernel: kauditd_printk_skb: 46 callbacks suppressed May 17 00:36:03.009054 kernel: audit: type=1400 audit(1747442162.963:1039): avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.009163 kernel: audit: type=1300 audit(1747442162.963:1039): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fb8d8254718 items=0 ppid=3407 pid=4043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:03.009208 kernel: audit: type=1327 audit(1747442162.963:1039): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264633035633737623861313561333735306131633632663738336639 May 17 00:36:03.009244 kernel: audit: type=1400 audit(1747442162.964:1040): avc: denied { bpf } for pid=4043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.009276 kernel: audit: type=1400 audit(1747442162.964:1040): avc: denied { bpf } for pid=4043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.963000 audit[4043]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fb8d8254718 items=0 ppid=3407 pid=4043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:03.028910 kernel: audit: type=1400 audit(1747442162.964:1040): avc: denied { bpf } for pid=4043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264633035633737623861313561333735306131633632663738336639 May 17 00:36:02.964000 audit[4043]: AVC avc: denied { bpf } for pid=4043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.964000 audit[4043]: AVC avc: denied { bpf } for pid=4043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.964000 audit[4043]: AVC avc: denied { bpf } for pid=4043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.964000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.047750 kernel: audit: type=1400 audit(1747442162.964:1040): avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.047984 kernel: audit: type=1400 audit(1747442162.964:1040): avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.964000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.067026 kernel: audit: type=1400 audit(1747442162.964:1040): avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.964000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.964000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.964000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.097090 kernel: audit: type=1400 audit(1747442162.964:1040): avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.964000 audit[4043]: AVC avc: denied { bpf } for pid=4043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.964000 audit[4043]: AVC avc: denied { bpf } for pid=4043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.964000 audit: BPF prog-id=142 op=LOAD May 17 00:36:02.964000 audit[4043]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00020a538 items=0 ppid=3407 pid=4043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:02.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264633035633737623861313561333735306131633632663738336639 May 17 00:36:02.983000 audit[4043]: AVC avc: denied { bpf } for pid=4043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.983000 audit[4043]: AVC avc: denied { bpf } for pid=4043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.983000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.983000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.983000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.983000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.983000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.983000 audit[4043]: AVC avc: denied { bpf } for pid=4043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.983000 audit[4043]: AVC avc: denied { bpf } for pid=4043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.983000 audit: BPF prog-id=143 op=LOAD May 17 00:36:02.983000 audit[4043]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00020a588 items=0 ppid=3407 pid=4043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:02.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264633035633737623861313561333735306131633632663738336639 May 17 00:36:03.015000 audit: BPF prog-id=143 op=UNLOAD May 17 00:36:03.015000 audit: BPF prog-id=142 op=UNLOAD May 17 00:36:03.015000 audit[4043]: AVC avc: denied { bpf } for pid=4043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.015000 audit[4043]: AVC avc: denied { bpf } for pid=4043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.015000 audit[4043]: AVC avc: denied { bpf } for pid=4043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.015000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.015000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.015000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.015000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.015000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.015000 audit[4043]: AVC avc: denied { bpf } for pid=4043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.015000 audit[4043]: AVC avc: denied { bpf } for pid=4043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.015000 audit: BPF prog-id=144 op=LOAD May 17 00:36:03.015000 audit[4043]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c00020a618 items=0 ppid=3407 pid=4043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:03.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264633035633737623861313561333735306131633632663738336639 May 17 00:36:03.105797 env[1754]: time="2025-05-17T00:36:03.099177207Z" level=info msg="StartContainer for \"2dc05c77b8a15a3750a1c62f783f96ae042785fc5722ed0b801e29addab7327b\" returns successfully" May 17 00:36:04.100170 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 17 00:36:04.100373 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 17 00:36:04.199322 systemd[1]: run-containerd-runc-k8s.io-2dc05c77b8a15a3750a1c62f783f96ae042785fc5722ed0b801e29addab7327b-runc.KyXZY5.mount: Deactivated successfully. May 17 00:36:04.636016 kubelet[2612]: I0517 00:36:04.632053 2612 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-84swf" podStartSLOduration=4.9977984840000005 podStartE2EDuration="23.632024011s" podCreationTimestamp="2025-05-17 00:35:41 +0000 UTC" firstStartedPulling="2025-05-17 00:35:43.830603559 +0000 UTC m=+54.216495881" lastFinishedPulling="2025-05-17 00:36:02.464829086 +0000 UTC m=+72.850721408" observedRunningTime="2025-05-17 00:36:03.207047023 +0000 UTC m=+73.592939353" watchObservedRunningTime="2025-05-17 00:36:04.632024011 +0000 UTC m=+75.017916341" May 17 00:36:04.637900 env[1754]: time="2025-05-17T00:36:04.637862239Z" level=info msg="StopPodSandbox for \"eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7\"" May 17 00:36:04.823464 env[1754]: time="2025-05-17T00:36:04.823421033Z" level=info msg="StopPodSandbox for \"6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7\"" May 17 00:36:04.825185 env[1754]: time="2025-05-17T00:36:04.823994538Z" level=info msg="StopPodSandbox for \"36322bbbcc0124d74351a0e6d46426aeb908d4e2945ac931333b7e4a1868899b\"" May 17 00:36:05.246675 env[1754]: 2025-05-17 00:36:04.783 [INFO][4145] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7" May 17 00:36:05.246675 env[1754]: 2025-05-17 00:36:04.784 [INFO][4145] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7" iface="eth0" netns="/var/run/netns/cni-9cd6a747-3fe9-ee9e-9fe8-cc6df8d5c66d" May 17 00:36:05.246675 env[1754]: 2025-05-17 00:36:04.785 [INFO][4145] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7" iface="eth0" netns="/var/run/netns/cni-9cd6a747-3fe9-ee9e-9fe8-cc6df8d5c66d" May 17 00:36:05.246675 env[1754]: 2025-05-17 00:36:04.786 [INFO][4145] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7" iface="eth0" netns="/var/run/netns/cni-9cd6a747-3fe9-ee9e-9fe8-cc6df8d5c66d" May 17 00:36:05.246675 env[1754]: 2025-05-17 00:36:04.786 [INFO][4145] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7" May 17 00:36:05.246675 env[1754]: 2025-05-17 00:36:04.786 [INFO][4145] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7" May 17 00:36:05.246675 env[1754]: 2025-05-17 00:36:05.204 [INFO][4164] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7" HandleID="k8s-pod-network.eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7" Workload="ip--172--31--29--247-k8s-whisker--6bfc64555d--67wfk-eth0" May 17 00:36:05.246675 env[1754]: 2025-05-17 00:36:05.209 [INFO][4164] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:05.246675 env[1754]: 2025-05-17 00:36:05.211 [INFO][4164] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:05.246675 env[1754]: 2025-05-17 00:36:05.237 [WARNING][4164] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7" HandleID="k8s-pod-network.eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7" Workload="ip--172--31--29--247-k8s-whisker--6bfc64555d--67wfk-eth0" May 17 00:36:05.246675 env[1754]: 2025-05-17 00:36:05.237 [INFO][4164] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7" HandleID="k8s-pod-network.eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7" Workload="ip--172--31--29--247-k8s-whisker--6bfc64555d--67wfk-eth0" May 17 00:36:05.246675 env[1754]: 2025-05-17 00:36:05.239 [INFO][4164] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:05.246675 env[1754]: 2025-05-17 00:36:05.243 [INFO][4145] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7" May 17 00:36:05.250273 env[1754]: time="2025-05-17T00:36:05.247246660Z" level=info msg="TearDown network for sandbox \"eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7\" successfully" May 17 00:36:05.250273 env[1754]: time="2025-05-17T00:36:05.247291748Z" level=info msg="StopPodSandbox for \"eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7\" returns successfully" May 17 00:36:05.250542 systemd[1]: run-netns-cni\x2d9cd6a747\x2d3fe9\x2dee9e\x2d9fe8\x2dcc6df8d5c66d.mount: Deactivated successfully. May 17 00:36:05.275564 env[1754]: 2025-05-17 00:36:04.904 [INFO][4180] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7" May 17 00:36:05.275564 env[1754]: 2025-05-17 00:36:04.904 [INFO][4180] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7" iface="eth0" netns="/var/run/netns/cni-db85972d-4582-6af3-39ed-71b60d14ec6b" May 17 00:36:05.275564 env[1754]: 2025-05-17 00:36:04.905 [INFO][4180] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7" iface="eth0" netns="/var/run/netns/cni-db85972d-4582-6af3-39ed-71b60d14ec6b" May 17 00:36:05.275564 env[1754]: 2025-05-17 00:36:04.905 [INFO][4180] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7" iface="eth0" netns="/var/run/netns/cni-db85972d-4582-6af3-39ed-71b60d14ec6b" May 17 00:36:05.275564 env[1754]: 2025-05-17 00:36:04.905 [INFO][4180] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7" May 17 00:36:05.275564 env[1754]: 2025-05-17 00:36:04.906 [INFO][4180] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7" May 17 00:36:05.275564 env[1754]: 2025-05-17 00:36:05.205 [INFO][4200] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7" HandleID="k8s-pod-network.6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7" Workload="ip--172--31--29--247-k8s-calico--apiserver--7fb9df588d--8ffw4-eth0" May 17 00:36:05.275564 env[1754]: 2025-05-17 00:36:05.211 [INFO][4200] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:05.275564 env[1754]: 2025-05-17 00:36:05.239 [INFO][4200] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:05.275564 env[1754]: 2025-05-17 00:36:05.256 [WARNING][4200] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7" HandleID="k8s-pod-network.6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7" Workload="ip--172--31--29--247-k8s-calico--apiserver--7fb9df588d--8ffw4-eth0" May 17 00:36:05.275564 env[1754]: 2025-05-17 00:36:05.256 [INFO][4200] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7" HandleID="k8s-pod-network.6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7" Workload="ip--172--31--29--247-k8s-calico--apiserver--7fb9df588d--8ffw4-eth0" May 17 00:36:05.275564 env[1754]: 2025-05-17 00:36:05.260 [INFO][4200] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:05.275564 env[1754]: 2025-05-17 00:36:05.273 [INFO][4180] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7" May 17 00:36:05.281521 env[1754]: 2025-05-17 00:36:04.921 [INFO][4184] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="36322bbbcc0124d74351a0e6d46426aeb908d4e2945ac931333b7e4a1868899b" May 17 00:36:05.281521 env[1754]: 2025-05-17 00:36:04.921 [INFO][4184] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="36322bbbcc0124d74351a0e6d46426aeb908d4e2945ac931333b7e4a1868899b" iface="eth0" netns="/var/run/netns/cni-f3a5af99-e30e-e191-e6a9-0b58b7f511a0" May 17 00:36:05.281521 env[1754]: 2025-05-17 00:36:04.921 [INFO][4184] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="36322bbbcc0124d74351a0e6d46426aeb908d4e2945ac931333b7e4a1868899b" iface="eth0" netns="/var/run/netns/cni-f3a5af99-e30e-e191-e6a9-0b58b7f511a0" May 17 00:36:05.281521 env[1754]: 2025-05-17 00:36:04.921 [INFO][4184] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="36322bbbcc0124d74351a0e6d46426aeb908d4e2945ac931333b7e4a1868899b" iface="eth0" netns="/var/run/netns/cni-f3a5af99-e30e-e191-e6a9-0b58b7f511a0" May 17 00:36:05.281521 env[1754]: 2025-05-17 00:36:04.921 [INFO][4184] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="36322bbbcc0124d74351a0e6d46426aeb908d4e2945ac931333b7e4a1868899b" May 17 00:36:05.281521 env[1754]: 2025-05-17 00:36:04.921 [INFO][4184] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="36322bbbcc0124d74351a0e6d46426aeb908d4e2945ac931333b7e4a1868899b" May 17 00:36:05.281521 env[1754]: 2025-05-17 00:36:05.205 [INFO][4206] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="36322bbbcc0124d74351a0e6d46426aeb908d4e2945ac931333b7e4a1868899b" HandleID="k8s-pod-network.36322bbbcc0124d74351a0e6d46426aeb908d4e2945ac931333b7e4a1868899b" Workload="ip--172--31--29--247-k8s-coredns--7c65d6cfc9--k5zt9-eth0" May 17 00:36:05.281521 env[1754]: 2025-05-17 00:36:05.212 [INFO][4206] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:05.281521 env[1754]: 2025-05-17 00:36:05.260 [INFO][4206] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:05.281521 env[1754]: 2025-05-17 00:36:05.270 [WARNING][4206] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="36322bbbcc0124d74351a0e6d46426aeb908d4e2945ac931333b7e4a1868899b" HandleID="k8s-pod-network.36322bbbcc0124d74351a0e6d46426aeb908d4e2945ac931333b7e4a1868899b" Workload="ip--172--31--29--247-k8s-coredns--7c65d6cfc9--k5zt9-eth0" May 17 00:36:05.281521 env[1754]: 2025-05-17 00:36:05.270 [INFO][4206] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="36322bbbcc0124d74351a0e6d46426aeb908d4e2945ac931333b7e4a1868899b" HandleID="k8s-pod-network.36322bbbcc0124d74351a0e6d46426aeb908d4e2945ac931333b7e4a1868899b" Workload="ip--172--31--29--247-k8s-coredns--7c65d6cfc9--k5zt9-eth0" May 17 00:36:05.281521 env[1754]: 2025-05-17 00:36:05.272 [INFO][4206] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:05.281521 env[1754]: 2025-05-17 00:36:05.278 [INFO][4184] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="36322bbbcc0124d74351a0e6d46426aeb908d4e2945ac931333b7e4a1868899b" May 17 00:36:05.286005 env[1754]: time="2025-05-17T00:36:05.282031277Z" level=info msg="TearDown network for sandbox \"36322bbbcc0124d74351a0e6d46426aeb908d4e2945ac931333b7e4a1868899b\" successfully" May 17 00:36:05.286005 env[1754]: time="2025-05-17T00:36:05.282074739Z" level=info msg="StopPodSandbox for \"36322bbbcc0124d74351a0e6d46426aeb908d4e2945ac931333b7e4a1868899b\" returns successfully" May 17 00:36:05.286005 env[1754]: time="2025-05-17T00:36:05.283311753Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-k5zt9,Uid:f23ec894-6dad-4109-907f-3f5a4907b516,Namespace:kube-system,Attempt:1,}" May 17 00:36:05.286005 env[1754]: time="2025-05-17T00:36:05.285059528Z" level=info msg="TearDown network for sandbox \"6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7\" successfully" May 17 00:36:05.286005 env[1754]: time="2025-05-17T00:36:05.285100556Z" level=info msg="StopPodSandbox for \"6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7\" returns successfully" May 17 00:36:05.282372 systemd[1]: run-netns-cni\x2ddb85972d\x2d4582\x2d6af3\x2d39ed\x2d71b60d14ec6b.mount: Deactivated successfully. May 17 00:36:05.286972 env[1754]: time="2025-05-17T00:36:05.286670669Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7fb9df588d-8ffw4,Uid:68cbb9bc-cdf9-4a9a-ac87-6f23197e12aa,Namespace:calico-apiserver,Attempt:1,}" May 17 00:36:05.290341 systemd[1]: run-netns-cni\x2df3a5af99\x2de30e\x2de191\x2de6a9\x2d0b58b7f511a0.mount: Deactivated successfully. May 17 00:36:05.441353 kubelet[2612]: I0517 00:36:05.441296 2612 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/0aab84c3-8540-487d-9d30-cf21cf4a5388-whisker-backend-key-pair\") pod \"0aab84c3-8540-487d-9d30-cf21cf4a5388\" (UID: \"0aab84c3-8540-487d-9d30-cf21cf4a5388\") " May 17 00:36:05.441647 kubelet[2612]: I0517 00:36:05.441629 2612 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0aab84c3-8540-487d-9d30-cf21cf4a5388-whisker-ca-bundle\") pod \"0aab84c3-8540-487d-9d30-cf21cf4a5388\" (UID: \"0aab84c3-8540-487d-9d30-cf21cf4a5388\") " May 17 00:36:05.441799 kubelet[2612]: I0517 00:36:05.441783 2612 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"kube-api-access-29q64\" (UniqueName: \"kubernetes.io/projected/0aab84c3-8540-487d-9d30-cf21cf4a5388-kube-api-access-29q64\") pod \"0aab84c3-8540-487d-9d30-cf21cf4a5388\" (UID: \"0aab84c3-8540-487d-9d30-cf21cf4a5388\") " May 17 00:36:05.468061 kubelet[2612]: I0517 00:36:05.461952 2612 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/0aab84c3-8540-487d-9d30-cf21cf4a5388-whisker-backend-key-pair" (OuterVolumeSpecName: "whisker-backend-key-pair") pod "0aab84c3-8540-487d-9d30-cf21cf4a5388" (UID: "0aab84c3-8540-487d-9d30-cf21cf4a5388"). InnerVolumeSpecName "whisker-backend-key-pair". PluginName "kubernetes.io/secret", VolumeGidValue "" May 17 00:36:05.468061 kubelet[2612]: I0517 00:36:05.461961 2612 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/0aab84c3-8540-487d-9d30-cf21cf4a5388-whisker-ca-bundle" (OuterVolumeSpecName: "whisker-ca-bundle") pod "0aab84c3-8540-487d-9d30-cf21cf4a5388" (UID: "0aab84c3-8540-487d-9d30-cf21cf4a5388"). InnerVolumeSpecName "whisker-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" May 17 00:36:05.468061 kubelet[2612]: I0517 00:36:05.467871 2612 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/0aab84c3-8540-487d-9d30-cf21cf4a5388-kube-api-access-29q64" (OuterVolumeSpecName: "kube-api-access-29q64") pod "0aab84c3-8540-487d-9d30-cf21cf4a5388" (UID: "0aab84c3-8540-487d-9d30-cf21cf4a5388"). InnerVolumeSpecName "kube-api-access-29q64". PluginName "kubernetes.io/projected", VolumeGidValue "" May 17 00:36:05.542512 kubelet[2612]: I0517 00:36:05.542376 2612 reconciler_common.go:293] "Volume detached for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/0aab84c3-8540-487d-9d30-cf21cf4a5388-whisker-backend-key-pair\") on node \"ip-172-31-29-247\" DevicePath \"\"" May 17 00:36:05.542512 kubelet[2612]: I0517 00:36:05.542411 2612 reconciler_common.go:293] "Volume detached for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0aab84c3-8540-487d-9d30-cf21cf4a5388-whisker-ca-bundle\") on node \"ip-172-31-29-247\" DevicePath \"\"" May 17 00:36:05.542512 kubelet[2612]: I0517 00:36:05.542433 2612 reconciler_common.go:293] "Volume detached for volume \"kube-api-access-29q64\" (UniqueName: \"kubernetes.io/projected/0aab84c3-8540-487d-9d30-cf21cf4a5388-kube-api-access-29q64\") on node \"ip-172-31-29-247\" DevicePath \"\"" May 17 00:36:05.563862 (udev-worker)[4099]: Network interface NamePolicy= disabled on kernel command line. May 17 00:36:05.571426 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:36:05.571535 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie59b1e223dd: link becomes ready May 17 00:36:05.578959 systemd-networkd[1462]: calie59b1e223dd: Link UP May 17 00:36:05.579248 systemd-networkd[1462]: calie59b1e223dd: Gained carrier May 17 00:36:05.603527 env[1754]: 2025-05-17 00:36:05.386 [INFO][4220] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 17 00:36:05.603527 env[1754]: 2025-05-17 00:36:05.400 [INFO][4220] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--29--247-k8s-coredns--7c65d6cfc9--k5zt9-eth0 coredns-7c65d6cfc9- kube-system f23ec894-6dad-4109-907f-3f5a4907b516 933 0 2025-05-17 00:34:54 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7c65d6cfc9 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-29-247 coredns-7c65d6cfc9-k5zt9 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calie59b1e223dd [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="2535d405a970c5417cd15b1e86ac3140e40afabe8059c388ee3f7e0546005247" Namespace="kube-system" Pod="coredns-7c65d6cfc9-k5zt9" WorkloadEndpoint="ip--172--31--29--247-k8s-coredns--7c65d6cfc9--k5zt9-" May 17 00:36:05.603527 env[1754]: 2025-05-17 00:36:05.401 [INFO][4220] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="2535d405a970c5417cd15b1e86ac3140e40afabe8059c388ee3f7e0546005247" Namespace="kube-system" Pod="coredns-7c65d6cfc9-k5zt9" WorkloadEndpoint="ip--172--31--29--247-k8s-coredns--7c65d6cfc9--k5zt9-eth0" May 17 00:36:05.603527 env[1754]: 2025-05-17 00:36:05.458 [INFO][4239] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2535d405a970c5417cd15b1e86ac3140e40afabe8059c388ee3f7e0546005247" HandleID="k8s-pod-network.2535d405a970c5417cd15b1e86ac3140e40afabe8059c388ee3f7e0546005247" Workload="ip--172--31--29--247-k8s-coredns--7c65d6cfc9--k5zt9-eth0" May 17 00:36:05.603527 env[1754]: 2025-05-17 00:36:05.459 [INFO][4239] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="2535d405a970c5417cd15b1e86ac3140e40afabe8059c388ee3f7e0546005247" HandleID="k8s-pod-network.2535d405a970c5417cd15b1e86ac3140e40afabe8059c388ee3f7e0546005247" Workload="ip--172--31--29--247-k8s-coredns--7c65d6cfc9--k5zt9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00032d4e0), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-29-247", "pod":"coredns-7c65d6cfc9-k5zt9", "timestamp":"2025-05-17 00:36:05.458780578 +0000 UTC"}, Hostname:"ip-172-31-29-247", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:36:05.603527 env[1754]: 2025-05-17 00:36:05.459 [INFO][4239] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:05.603527 env[1754]: 2025-05-17 00:36:05.459 [INFO][4239] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:05.603527 env[1754]: 2025-05-17 00:36:05.459 [INFO][4239] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-29-247' May 17 00:36:05.603527 env[1754]: 2025-05-17 00:36:05.472 [INFO][4239] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.2535d405a970c5417cd15b1e86ac3140e40afabe8059c388ee3f7e0546005247" host="ip-172-31-29-247" May 17 00:36:05.603527 env[1754]: 2025-05-17 00:36:05.487 [INFO][4239] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-29-247" May 17 00:36:05.603527 env[1754]: 2025-05-17 00:36:05.513 [INFO][4239] ipam/ipam.go 511: Trying affinity for 192.168.127.64/26 host="ip-172-31-29-247" May 17 00:36:05.603527 env[1754]: 2025-05-17 00:36:05.523 [INFO][4239] ipam/ipam.go 158: Attempting to load block cidr=192.168.127.64/26 host="ip-172-31-29-247" May 17 00:36:05.603527 env[1754]: 2025-05-17 00:36:05.526 [INFO][4239] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.127.64/26 host="ip-172-31-29-247" May 17 00:36:05.603527 env[1754]: 2025-05-17 00:36:05.526 [INFO][4239] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.127.64/26 handle="k8s-pod-network.2535d405a970c5417cd15b1e86ac3140e40afabe8059c388ee3f7e0546005247" host="ip-172-31-29-247" May 17 00:36:05.603527 env[1754]: 2025-05-17 00:36:05.528 [INFO][4239] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.2535d405a970c5417cd15b1e86ac3140e40afabe8059c388ee3f7e0546005247 May 17 00:36:05.603527 env[1754]: 2025-05-17 00:36:05.534 [INFO][4239] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.127.64/26 handle="k8s-pod-network.2535d405a970c5417cd15b1e86ac3140e40afabe8059c388ee3f7e0546005247" host="ip-172-31-29-247" May 17 00:36:05.603527 env[1754]: 2025-05-17 00:36:05.544 [INFO][4239] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.127.65/26] block=192.168.127.64/26 handle="k8s-pod-network.2535d405a970c5417cd15b1e86ac3140e40afabe8059c388ee3f7e0546005247" host="ip-172-31-29-247" May 17 00:36:05.603527 env[1754]: 2025-05-17 00:36:05.544 [INFO][4239] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.127.65/26] handle="k8s-pod-network.2535d405a970c5417cd15b1e86ac3140e40afabe8059c388ee3f7e0546005247" host="ip-172-31-29-247" May 17 00:36:05.603527 env[1754]: 2025-05-17 00:36:05.544 [INFO][4239] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:05.603527 env[1754]: 2025-05-17 00:36:05.544 [INFO][4239] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.127.65/26] IPv6=[] ContainerID="2535d405a970c5417cd15b1e86ac3140e40afabe8059c388ee3f7e0546005247" HandleID="k8s-pod-network.2535d405a970c5417cd15b1e86ac3140e40afabe8059c388ee3f7e0546005247" Workload="ip--172--31--29--247-k8s-coredns--7c65d6cfc9--k5zt9-eth0" May 17 00:36:05.604909 env[1754]: 2025-05-17 00:36:05.551 [INFO][4220] cni-plugin/k8s.go 418: Populated endpoint ContainerID="2535d405a970c5417cd15b1e86ac3140e40afabe8059c388ee3f7e0546005247" Namespace="kube-system" Pod="coredns-7c65d6cfc9-k5zt9" WorkloadEndpoint="ip--172--31--29--247-k8s-coredns--7c65d6cfc9--k5zt9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--29--247-k8s-coredns--7c65d6cfc9--k5zt9-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"f23ec894-6dad-4109-907f-3f5a4907b516", ResourceVersion:"933", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 34, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-29-247", ContainerID:"", Pod:"coredns-7c65d6cfc9-k5zt9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.127.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie59b1e223dd", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:05.604909 env[1754]: 2025-05-17 00:36:05.552 [INFO][4220] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.127.65/32] ContainerID="2535d405a970c5417cd15b1e86ac3140e40afabe8059c388ee3f7e0546005247" Namespace="kube-system" Pod="coredns-7c65d6cfc9-k5zt9" WorkloadEndpoint="ip--172--31--29--247-k8s-coredns--7c65d6cfc9--k5zt9-eth0" May 17 00:36:05.604909 env[1754]: 2025-05-17 00:36:05.552 [INFO][4220] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie59b1e223dd ContainerID="2535d405a970c5417cd15b1e86ac3140e40afabe8059c388ee3f7e0546005247" Namespace="kube-system" Pod="coredns-7c65d6cfc9-k5zt9" WorkloadEndpoint="ip--172--31--29--247-k8s-coredns--7c65d6cfc9--k5zt9-eth0" May 17 00:36:05.604909 env[1754]: 2025-05-17 00:36:05.572 [INFO][4220] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2535d405a970c5417cd15b1e86ac3140e40afabe8059c388ee3f7e0546005247" Namespace="kube-system" Pod="coredns-7c65d6cfc9-k5zt9" WorkloadEndpoint="ip--172--31--29--247-k8s-coredns--7c65d6cfc9--k5zt9-eth0" May 17 00:36:05.604909 env[1754]: 2025-05-17 00:36:05.573 [INFO][4220] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="2535d405a970c5417cd15b1e86ac3140e40afabe8059c388ee3f7e0546005247" Namespace="kube-system" Pod="coredns-7c65d6cfc9-k5zt9" WorkloadEndpoint="ip--172--31--29--247-k8s-coredns--7c65d6cfc9--k5zt9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--29--247-k8s-coredns--7c65d6cfc9--k5zt9-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"f23ec894-6dad-4109-907f-3f5a4907b516", ResourceVersion:"933", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 34, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-29-247", ContainerID:"2535d405a970c5417cd15b1e86ac3140e40afabe8059c388ee3f7e0546005247", Pod:"coredns-7c65d6cfc9-k5zt9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.127.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie59b1e223dd", MAC:"7a:c1:f2:82:b3:83", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:05.604909 env[1754]: 2025-05-17 00:36:05.600 [INFO][4220] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="2535d405a970c5417cd15b1e86ac3140e40afabe8059c388ee3f7e0546005247" Namespace="kube-system" Pod="coredns-7c65d6cfc9-k5zt9" WorkloadEndpoint="ip--172--31--29--247-k8s-coredns--7c65d6cfc9--k5zt9-eth0" May 17 00:36:05.647584 systemd-networkd[1462]: cali03cfdfc282b: Link UP May 17 00:36:05.651041 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali03cfdfc282b: link becomes ready May 17 00:36:05.650574 systemd-networkd[1462]: cali03cfdfc282b: Gained carrier May 17 00:36:05.665243 env[1754]: time="2025-05-17T00:36:05.664929011Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:36:05.665243 env[1754]: time="2025-05-17T00:36:05.664981041Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:36:05.665243 env[1754]: time="2025-05-17T00:36:05.664996514Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:36:05.671478 env[1754]: time="2025-05-17T00:36:05.669834188Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2535d405a970c5417cd15b1e86ac3140e40afabe8059c388ee3f7e0546005247 pid=4273 runtime=io.containerd.runc.v2 May 17 00:36:05.675420 env[1754]: 2025-05-17 00:36:05.383 [INFO][4215] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 17 00:36:05.675420 env[1754]: 2025-05-17 00:36:05.405 [INFO][4215] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--29--247-k8s-calico--apiserver--7fb9df588d--8ffw4-eth0 calico-apiserver-7fb9df588d- calico-apiserver 68cbb9bc-cdf9-4a9a-ac87-6f23197e12aa 932 0 2025-05-17 00:35:37 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7fb9df588d projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-29-247 calico-apiserver-7fb9df588d-8ffw4 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali03cfdfc282b [] [] }} ContainerID="d5f51fd7ee1ecf3cd020be4822fe0c76e5db0240deabffc12dd59b7fdf843d48" Namespace="calico-apiserver" Pod="calico-apiserver-7fb9df588d-8ffw4" WorkloadEndpoint="ip--172--31--29--247-k8s-calico--apiserver--7fb9df588d--8ffw4-" May 17 00:36:05.675420 env[1754]: 2025-05-17 00:36:05.406 [INFO][4215] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="d5f51fd7ee1ecf3cd020be4822fe0c76e5db0240deabffc12dd59b7fdf843d48" Namespace="calico-apiserver" Pod="calico-apiserver-7fb9df588d-8ffw4" WorkloadEndpoint="ip--172--31--29--247-k8s-calico--apiserver--7fb9df588d--8ffw4-eth0" May 17 00:36:05.675420 env[1754]: 2025-05-17 00:36:05.472 [INFO][4244] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d5f51fd7ee1ecf3cd020be4822fe0c76e5db0240deabffc12dd59b7fdf843d48" HandleID="k8s-pod-network.d5f51fd7ee1ecf3cd020be4822fe0c76e5db0240deabffc12dd59b7fdf843d48" Workload="ip--172--31--29--247-k8s-calico--apiserver--7fb9df588d--8ffw4-eth0" May 17 00:36:05.675420 env[1754]: 2025-05-17 00:36:05.472 [INFO][4244] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d5f51fd7ee1ecf3cd020be4822fe0c76e5db0240deabffc12dd59b7fdf843d48" HandleID="k8s-pod-network.d5f51fd7ee1ecf3cd020be4822fe0c76e5db0240deabffc12dd59b7fdf843d48" Workload="ip--172--31--29--247-k8s-calico--apiserver--7fb9df588d--8ffw4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d1020), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-29-247", "pod":"calico-apiserver-7fb9df588d-8ffw4", "timestamp":"2025-05-17 00:36:05.472129372 +0000 UTC"}, Hostname:"ip-172-31-29-247", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:36:05.675420 env[1754]: 2025-05-17 00:36:05.472 [INFO][4244] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:05.675420 env[1754]: 2025-05-17 00:36:05.544 [INFO][4244] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:05.675420 env[1754]: 2025-05-17 00:36:05.544 [INFO][4244] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-29-247' May 17 00:36:05.675420 env[1754]: 2025-05-17 00:36:05.574 [INFO][4244] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.d5f51fd7ee1ecf3cd020be4822fe0c76e5db0240deabffc12dd59b7fdf843d48" host="ip-172-31-29-247" May 17 00:36:05.675420 env[1754]: 2025-05-17 00:36:05.607 [INFO][4244] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-29-247" May 17 00:36:05.675420 env[1754]: 2025-05-17 00:36:05.614 [INFO][4244] ipam/ipam.go 511: Trying affinity for 192.168.127.64/26 host="ip-172-31-29-247" May 17 00:36:05.675420 env[1754]: 2025-05-17 00:36:05.616 [INFO][4244] ipam/ipam.go 158: Attempting to load block cidr=192.168.127.64/26 host="ip-172-31-29-247" May 17 00:36:05.675420 env[1754]: 2025-05-17 00:36:05.619 [INFO][4244] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.127.64/26 host="ip-172-31-29-247" May 17 00:36:05.675420 env[1754]: 2025-05-17 00:36:05.619 [INFO][4244] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.127.64/26 handle="k8s-pod-network.d5f51fd7ee1ecf3cd020be4822fe0c76e5db0240deabffc12dd59b7fdf843d48" host="ip-172-31-29-247" May 17 00:36:05.675420 env[1754]: 2025-05-17 00:36:05.621 [INFO][4244] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.d5f51fd7ee1ecf3cd020be4822fe0c76e5db0240deabffc12dd59b7fdf843d48 May 17 00:36:05.675420 env[1754]: 2025-05-17 00:36:05.630 [INFO][4244] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.127.64/26 handle="k8s-pod-network.d5f51fd7ee1ecf3cd020be4822fe0c76e5db0240deabffc12dd59b7fdf843d48" host="ip-172-31-29-247" May 17 00:36:05.675420 env[1754]: 2025-05-17 00:36:05.637 [INFO][4244] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.127.66/26] block=192.168.127.64/26 handle="k8s-pod-network.d5f51fd7ee1ecf3cd020be4822fe0c76e5db0240deabffc12dd59b7fdf843d48" host="ip-172-31-29-247" May 17 00:36:05.675420 env[1754]: 2025-05-17 00:36:05.637 [INFO][4244] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.127.66/26] handle="k8s-pod-network.d5f51fd7ee1ecf3cd020be4822fe0c76e5db0240deabffc12dd59b7fdf843d48" host="ip-172-31-29-247" May 17 00:36:05.675420 env[1754]: 2025-05-17 00:36:05.638 [INFO][4244] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:05.675420 env[1754]: 2025-05-17 00:36:05.638 [INFO][4244] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.127.66/26] IPv6=[] ContainerID="d5f51fd7ee1ecf3cd020be4822fe0c76e5db0240deabffc12dd59b7fdf843d48" HandleID="k8s-pod-network.d5f51fd7ee1ecf3cd020be4822fe0c76e5db0240deabffc12dd59b7fdf843d48" Workload="ip--172--31--29--247-k8s-calico--apiserver--7fb9df588d--8ffw4-eth0" May 17 00:36:05.677109 env[1754]: 2025-05-17 00:36:05.643 [INFO][4215] cni-plugin/k8s.go 418: Populated endpoint ContainerID="d5f51fd7ee1ecf3cd020be4822fe0c76e5db0240deabffc12dd59b7fdf843d48" Namespace="calico-apiserver" Pod="calico-apiserver-7fb9df588d-8ffw4" WorkloadEndpoint="ip--172--31--29--247-k8s-calico--apiserver--7fb9df588d--8ffw4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--29--247-k8s-calico--apiserver--7fb9df588d--8ffw4-eth0", GenerateName:"calico-apiserver-7fb9df588d-", Namespace:"calico-apiserver", SelfLink:"", UID:"68cbb9bc-cdf9-4a9a-ac87-6f23197e12aa", ResourceVersion:"932", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7fb9df588d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-29-247", ContainerID:"", Pod:"calico-apiserver-7fb9df588d-8ffw4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.127.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali03cfdfc282b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:05.677109 env[1754]: 2025-05-17 00:36:05.643 [INFO][4215] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.127.66/32] ContainerID="d5f51fd7ee1ecf3cd020be4822fe0c76e5db0240deabffc12dd59b7fdf843d48" Namespace="calico-apiserver" Pod="calico-apiserver-7fb9df588d-8ffw4" WorkloadEndpoint="ip--172--31--29--247-k8s-calico--apiserver--7fb9df588d--8ffw4-eth0" May 17 00:36:05.677109 env[1754]: 2025-05-17 00:36:05.643 [INFO][4215] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali03cfdfc282b ContainerID="d5f51fd7ee1ecf3cd020be4822fe0c76e5db0240deabffc12dd59b7fdf843d48" Namespace="calico-apiserver" Pod="calico-apiserver-7fb9df588d-8ffw4" WorkloadEndpoint="ip--172--31--29--247-k8s-calico--apiserver--7fb9df588d--8ffw4-eth0" May 17 00:36:05.677109 env[1754]: 2025-05-17 00:36:05.651 [INFO][4215] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d5f51fd7ee1ecf3cd020be4822fe0c76e5db0240deabffc12dd59b7fdf843d48" Namespace="calico-apiserver" Pod="calico-apiserver-7fb9df588d-8ffw4" WorkloadEndpoint="ip--172--31--29--247-k8s-calico--apiserver--7fb9df588d--8ffw4-eth0" May 17 00:36:05.677109 env[1754]: 2025-05-17 00:36:05.651 [INFO][4215] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="d5f51fd7ee1ecf3cd020be4822fe0c76e5db0240deabffc12dd59b7fdf843d48" Namespace="calico-apiserver" Pod="calico-apiserver-7fb9df588d-8ffw4" WorkloadEndpoint="ip--172--31--29--247-k8s-calico--apiserver--7fb9df588d--8ffw4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--29--247-k8s-calico--apiserver--7fb9df588d--8ffw4-eth0", GenerateName:"calico-apiserver-7fb9df588d-", Namespace:"calico-apiserver", SelfLink:"", UID:"68cbb9bc-cdf9-4a9a-ac87-6f23197e12aa", ResourceVersion:"932", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7fb9df588d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-29-247", ContainerID:"d5f51fd7ee1ecf3cd020be4822fe0c76e5db0240deabffc12dd59b7fdf843d48", Pod:"calico-apiserver-7fb9df588d-8ffw4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.127.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali03cfdfc282b", MAC:"ea:55:0e:07:64:76", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:05.677109 env[1754]: 2025-05-17 00:36:05.670 [INFO][4215] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="d5f51fd7ee1ecf3cd020be4822fe0c76e5db0240deabffc12dd59b7fdf843d48" Namespace="calico-apiserver" Pod="calico-apiserver-7fb9df588d-8ffw4" WorkloadEndpoint="ip--172--31--29--247-k8s-calico--apiserver--7fb9df588d--8ffw4-eth0" May 17 00:36:05.688931 systemd[1]: Started cri-containerd-2535d405a970c5417cd15b1e86ac3140e40afabe8059c388ee3f7e0546005247.scope. May 17 00:36:05.707033 env[1754]: time="2025-05-17T00:36:05.706948530Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:36:05.707304 env[1754]: time="2025-05-17T00:36:05.707263227Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:36:05.707443 env[1754]: time="2025-05-17T00:36:05.707418249Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:36:05.707872 env[1754]: time="2025-05-17T00:36:05.707826348Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d5f51fd7ee1ecf3cd020be4822fe0c76e5db0240deabffc12dd59b7fdf843d48 pid=4310 runtime=io.containerd.runc.v2 May 17 00:36:05.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.714000 audit: BPF prog-id=145 op=LOAD May 17 00:36:05.715000 audit[4283]: AVC avc: denied { bpf } for pid=4283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.715000 audit[4283]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4273 pid=4283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:05.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235333564343035613937306335343137636431356231653836616333 May 17 00:36:05.715000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.715000 audit[4283]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4273 pid=4283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:05.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235333564343035613937306335343137636431356231653836616333 May 17 00:36:05.715000 audit[4283]: AVC avc: denied { bpf } for pid=4283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.715000 audit[4283]: AVC avc: denied { bpf } for pid=4283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.715000 audit[4283]: AVC avc: denied { bpf } for pid=4283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.715000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.715000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.715000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.715000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.715000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.715000 audit[4283]: AVC avc: denied { bpf } for pid=4283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.715000 audit[4283]: AVC avc: denied { bpf } for pid=4283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.715000 audit: BPF prog-id=146 op=LOAD May 17 00:36:05.715000 audit[4283]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000356a60 items=0 ppid=4273 pid=4283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:05.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235333564343035613937306335343137636431356231653836616333 May 17 00:36:05.715000 audit[4283]: AVC avc: denied { bpf } for pid=4283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.715000 audit[4283]: AVC avc: denied { bpf } for pid=4283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.715000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.715000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.715000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.715000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.715000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.715000 audit[4283]: AVC avc: denied { bpf } for pid=4283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.715000 audit[4283]: AVC avc: denied { bpf } for pid=4283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.715000 audit: BPF prog-id=147 op=LOAD May 17 00:36:05.715000 audit[4283]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000356aa8 items=0 ppid=4273 pid=4283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:05.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235333564343035613937306335343137636431356231653836616333 May 17 00:36:05.715000 audit: BPF prog-id=147 op=UNLOAD May 17 00:36:05.715000 audit: BPF prog-id=146 op=UNLOAD May 17 00:36:05.716000 audit[4283]: AVC avc: denied { bpf } for pid=4283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.716000 audit[4283]: AVC avc: denied { bpf } for pid=4283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.716000 audit[4283]: AVC avc: denied { bpf } for pid=4283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.716000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.716000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.716000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.716000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.716000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.716000 audit[4283]: AVC avc: denied { bpf } for pid=4283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.716000 audit[4283]: AVC avc: denied { bpf } for pid=4283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.716000 audit: BPF prog-id=148 op=LOAD May 17 00:36:05.716000 audit[4283]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000356eb8 items=0 ppid=4273 pid=4283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:05.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235333564343035613937306335343137636431356231653836616333 May 17 00:36:05.727674 systemd[1]: Started cri-containerd-d5f51fd7ee1ecf3cd020be4822fe0c76e5db0240deabffc12dd59b7fdf843d48.scope. May 17 00:36:05.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.750000 audit: BPF prog-id=149 op=LOAD May 17 00:36:05.751000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.751000 audit[4323]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4310 pid=4323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:05.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435663531666437656531656366336364303230626534383232666530 May 17 00:36:05.751000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.751000 audit[4323]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4310 pid=4323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:05.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435663531666437656531656366336364303230626534383232666530 May 17 00:36:05.751000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.751000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.751000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.751000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.751000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.751000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.751000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.751000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.751000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.751000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.751000 audit: BPF prog-id=150 op=LOAD May 17 00:36:05.751000 audit[4323]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000349ce0 items=0 ppid=4310 pid=4323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:05.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435663531666437656531656366336364303230626534383232666530 May 17 00:36:05.751000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.751000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.751000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.751000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.751000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.751000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.751000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.751000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.751000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.751000 audit: BPF prog-id=151 op=LOAD May 17 00:36:05.751000 audit[4323]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000349d28 items=0 ppid=4310 pid=4323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:05.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435663531666437656531656366336364303230626534383232666530 May 17 00:36:05.751000 audit: BPF prog-id=151 op=UNLOAD May 17 00:36:05.751000 audit: BPF prog-id=150 op=UNLOAD May 17 00:36:05.751000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.751000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.751000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.751000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.751000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.751000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.751000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.751000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.751000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.751000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.751000 audit: BPF prog-id=152 op=LOAD May 17 00:36:05.751000 audit[4323]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003ce138 items=0 ppid=4310 pid=4323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:05.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435663531666437656531656366336364303230626534383232666530 May 17 00:36:05.776944 env[1754]: time="2025-05-17T00:36:05.776893942Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-k5zt9,Uid:f23ec894-6dad-4109-907f-3f5a4907b516,Namespace:kube-system,Attempt:1,} returns sandbox id \"2535d405a970c5417cd15b1e86ac3140e40afabe8059c388ee3f7e0546005247\"" May 17 00:36:05.800435 env[1754]: time="2025-05-17T00:36:05.794074643Z" level=info msg="CreateContainer within sandbox \"2535d405a970c5417cd15b1e86ac3140e40afabe8059c388ee3f7e0546005247\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 17 00:36:05.819260 env[1754]: time="2025-05-17T00:36:05.819215816Z" level=info msg="StopPodSandbox for \"68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a\"" May 17 00:36:05.849421 env[1754]: time="2025-05-17T00:36:05.849196130Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7fb9df588d-8ffw4,Uid:68cbb9bc-cdf9-4a9a-ac87-6f23197e12aa,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"d5f51fd7ee1ecf3cd020be4822fe0c76e5db0240deabffc12dd59b7fdf843d48\"" May 17 00:36:05.850190 systemd[1]: Removed slice kubepods-besteffort-pod0aab84c3_8540_487d_9d30_cf21cf4a5388.slice. May 17 00:36:05.859229 env[1754]: time="2025-05-17T00:36:05.859019418Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\"" May 17 00:36:05.862000 audit[4400]: AVC avc: denied { write } for pid=4400 comm="tee" name="fd" dev="proc" ino=28694 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:36:05.862000 audit[4400]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc7fcf17e9 a2=241 a3=1b6 items=1 ppid=4354 pid=4400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:05.862000 audit: CWD cwd="/etc/service/enabled/cni/log" May 17 00:36:05.862000 audit: PATH item=0 name="/dev/fd/63" inode=28688 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:05.862000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:36:05.873509 env[1754]: time="2025-05-17T00:36:05.873429030Z" level=info msg="CreateContainer within sandbox \"2535d405a970c5417cd15b1e86ac3140e40afabe8059c388ee3f7e0546005247\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"7e0a76398218f23211b886db246b84e54d97f0c7d9a484b38782c5a02b5377c7\"" May 17 00:36:05.877230 env[1754]: time="2025-05-17T00:36:05.877185166Z" level=info msg="StartContainer for \"7e0a76398218f23211b886db246b84e54d97f0c7d9a484b38782c5a02b5377c7\"" May 17 00:36:05.899000 audit[4420]: AVC avc: denied { write } for pid=4420 comm="tee" name="fd" dev="proc" ino=27874 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:36:05.899000 audit[4420]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc336457d7 a2=241 a3=1b6 items=1 ppid=4362 pid=4420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:05.899000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 17 00:36:05.899000 audit: PATH item=0 name="/dev/fd/63" inode=27868 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:05.899000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:36:05.906000 audit[4402]: AVC avc: denied { write } for pid=4402 comm="tee" name="fd" dev="proc" ino=27912 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:36:05.906000 audit[4402]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc1670b7e8 a2=241 a3=1b6 items=1 ppid=4363 pid=4402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:05.906000 audit: CWD cwd="/etc/service/enabled/bird/log" May 17 00:36:05.906000 audit: PATH item=0 name="/dev/fd/63" inode=28691 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:05.906000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:36:05.917307 systemd[1]: Started cri-containerd-7e0a76398218f23211b886db246b84e54d97f0c7d9a484b38782c5a02b5377c7.scope. May 17 00:36:05.949000 audit[4411]: AVC avc: denied { write } for pid=4411 comm="tee" name="fd" dev="proc" ino=27930 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:36:05.949000 audit[4411]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd5c1347e7 a2=241 a3=1b6 items=1 ppid=4358 pid=4411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:05.949000 audit: CWD cwd="/etc/service/enabled/confd/log" May 17 00:36:05.949000 audit: PATH item=0 name="/dev/fd/63" inode=27852 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:05.949000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:36:05.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.966000 audit: BPF prog-id=153 op=LOAD May 17 00:36:05.966000 audit[4417]: AVC avc: denied { bpf } for pid=4417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.966000 audit[4417]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4273 pid=4417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:05.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765306137363339383231386632333231316238383664623234366238 May 17 00:36:05.966000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.966000 audit[4417]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4273 pid=4417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:05.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765306137363339383231386632333231316238383664623234366238 May 17 00:36:05.967000 audit[4417]: AVC avc: denied { bpf } for pid=4417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.967000 audit[4417]: AVC avc: denied { bpf } for pid=4417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.967000 audit[4417]: AVC avc: denied { bpf } for pid=4417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.967000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.967000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.967000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.967000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.967000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.967000 audit[4417]: AVC avc: denied { bpf } for pid=4417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.967000 audit[4417]: AVC avc: denied { bpf } for pid=4417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.967000 audit: BPF prog-id=154 op=LOAD May 17 00:36:05.967000 audit[4417]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000298e20 items=0 ppid=4273 pid=4417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:05.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765306137363339383231386632333231316238383664623234366238 May 17 00:36:05.967000 audit[4417]: AVC avc: denied { bpf } for pid=4417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.967000 audit[4417]: AVC avc: denied { bpf } for pid=4417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.967000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.967000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.967000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.967000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.967000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.967000 audit[4417]: AVC avc: denied { bpf } for pid=4417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.967000 audit[4417]: AVC avc: denied { bpf } for pid=4417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.967000 audit: BPF prog-id=155 op=LOAD May 17 00:36:05.967000 audit[4417]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000298e68 items=0 ppid=4273 pid=4417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:05.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765306137363339383231386632333231316238383664623234366238 May 17 00:36:05.967000 audit: BPF prog-id=155 op=UNLOAD May 17 00:36:05.967000 audit: BPF prog-id=154 op=UNLOAD May 17 00:36:05.967000 audit[4417]: AVC avc: denied { bpf } for pid=4417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.967000 audit[4417]: AVC avc: denied { bpf } for pid=4417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.967000 audit[4417]: AVC avc: denied { bpf } for pid=4417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.967000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.967000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.967000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.967000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.967000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.967000 audit[4417]: AVC avc: denied { bpf } for pid=4417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.967000 audit[4417]: AVC avc: denied { bpf } for pid=4417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.967000 audit: BPF prog-id=156 op=LOAD May 17 00:36:05.967000 audit[4417]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000299278 items=0 ppid=4273 pid=4417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:05.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765306137363339383231386632333231316238383664623234366238 May 17 00:36:06.003000 audit[4439]: AVC avc: denied { write } for pid=4439 comm="tee" name="fd" dev="proc" ino=27971 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:36:06.003000 audit[4439]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff51d277e7 a2=241 a3=1b6 items=1 ppid=4357 pid=4439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:06.003000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 17 00:36:06.003000 audit: PATH item=0 name="/dev/fd/63" inode=27927 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:06.003000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:36:06.009372 env[1754]: time="2025-05-17T00:36:06.009323458Z" level=info msg="StartContainer for \"7e0a76398218f23211b886db246b84e54d97f0c7d9a484b38782c5a02b5377c7\" returns successfully" May 17 00:36:06.030000 audit[4456]: AVC avc: denied { write } for pid=4456 comm="tee" name="fd" dev="proc" ino=28766 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:36:06.034000 audit[4461]: AVC avc: denied { write } for pid=4461 comm="tee" name="fd" dev="proc" ino=28769 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:36:06.030000 audit[4456]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd1d0dd7d8 a2=241 a3=1b6 items=1 ppid=4360 pid=4456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:06.030000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 17 00:36:06.030000 audit: PATH item=0 name="/dev/fd/63" inode=27933 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:06.030000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:36:06.034000 audit[4461]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd052e77e7 a2=241 a3=1b6 items=1 ppid=4368 pid=4461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:06.034000 audit: CWD cwd="/etc/service/enabled/felix/log" May 17 00:36:06.034000 audit: PATH item=0 name="/dev/fd/63" inode=27941 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:06.034000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:36:06.097350 env[1754]: 2025-05-17 00:36:06.008 [INFO][4396] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a" May 17 00:36:06.097350 env[1754]: 2025-05-17 00:36:06.008 [INFO][4396] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a" iface="eth0" netns="/var/run/netns/cni-defe8524-a598-1ca3-bcda-847aa064b351" May 17 00:36:06.097350 env[1754]: 2025-05-17 00:36:06.008 [INFO][4396] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a" iface="eth0" netns="/var/run/netns/cni-defe8524-a598-1ca3-bcda-847aa064b351" May 17 00:36:06.097350 env[1754]: 2025-05-17 00:36:06.009 [INFO][4396] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a" iface="eth0" netns="/var/run/netns/cni-defe8524-a598-1ca3-bcda-847aa064b351" May 17 00:36:06.097350 env[1754]: 2025-05-17 00:36:06.009 [INFO][4396] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a" May 17 00:36:06.097350 env[1754]: 2025-05-17 00:36:06.009 [INFO][4396] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a" May 17 00:36:06.097350 env[1754]: 2025-05-17 00:36:06.072 [INFO][4477] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a" HandleID="k8s-pod-network.68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a" Workload="ip--172--31--29--247-k8s-goldmane--8f77d7b6c--z92z5-eth0" May 17 00:36:06.097350 env[1754]: 2025-05-17 00:36:06.072 [INFO][4477] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:06.097350 env[1754]: 2025-05-17 00:36:06.072 [INFO][4477] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:06.097350 env[1754]: 2025-05-17 00:36:06.089 [WARNING][4477] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a" HandleID="k8s-pod-network.68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a" Workload="ip--172--31--29--247-k8s-goldmane--8f77d7b6c--z92z5-eth0" May 17 00:36:06.097350 env[1754]: 2025-05-17 00:36:06.089 [INFO][4477] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a" HandleID="k8s-pod-network.68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a" Workload="ip--172--31--29--247-k8s-goldmane--8f77d7b6c--z92z5-eth0" May 17 00:36:06.097350 env[1754]: 2025-05-17 00:36:06.092 [INFO][4477] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:06.097350 env[1754]: 2025-05-17 00:36:06.095 [INFO][4396] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a" May 17 00:36:06.100614 env[1754]: time="2025-05-17T00:36:06.100555609Z" level=info msg="TearDown network for sandbox \"68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a\" successfully" May 17 00:36:06.100845 env[1754]: time="2025-05-17T00:36:06.100818577Z" level=info msg="StopPodSandbox for \"68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a\" returns successfully" May 17 00:36:06.105304 env[1754]: time="2025-05-17T00:36:06.105257815Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-8f77d7b6c-z92z5,Uid:b130376b-e592-4257-8150-fa1595d1cccd,Namespace:calico-system,Attempt:1,}" May 17 00:36:06.256174 systemd[1]: run-netns-cni\x2ddefe8524\x2da598\x2d1ca3\x2dbcda\x2d847aa064b351.mount: Deactivated successfully. May 17 00:36:06.263773 systemd[1]: var-lib-kubelet-pods-0aab84c3\x2d8540\x2d487d\x2d9d30\x2dcf21cf4a5388-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2d29q64.mount: Deactivated successfully. May 17 00:36:06.263914 systemd[1]: var-lib-kubelet-pods-0aab84c3\x2d8540\x2d487d\x2d9d30\x2dcf21cf4a5388-volumes-kubernetes.io\x7esecret-whisker\x2dbackend\x2dkey\x2dpair.mount: Deactivated successfully. May 17 00:36:06.321969 kubelet[2612]: I0517 00:36:06.321906 2612 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7c65d6cfc9-k5zt9" podStartSLOduration=72.321884049 podStartE2EDuration="1m12.321884049s" podCreationTimestamp="2025-05-17 00:34:54 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:36:06.277041094 +0000 UTC m=+76.662933424" watchObservedRunningTime="2025-05-17 00:36:06.321884049 +0000 UTC m=+76.707776379" May 17 00:36:06.395916 systemd-networkd[1462]: calie82f99ea9c5: Link UP May 17 00:36:06.400854 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie82f99ea9c5: link becomes ready May 17 00:36:06.400428 systemd-networkd[1462]: calie82f99ea9c5: Gained carrier May 17 00:36:06.427606 env[1754]: 2025-05-17 00:36:06.208 [INFO][4495] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 17 00:36:06.427606 env[1754]: 2025-05-17 00:36:06.226 [INFO][4495] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--29--247-k8s-goldmane--8f77d7b6c--z92z5-eth0 goldmane-8f77d7b6c- calico-system b130376b-e592-4257-8150-fa1595d1cccd 946 0 2025-05-17 00:35:41 +0000 UTC map[app.kubernetes.io/name:goldmane k8s-app:goldmane pod-template-hash:8f77d7b6c projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:goldmane] map[] [] [] []} {k8s ip-172-31-29-247 goldmane-8f77d7b6c-z92z5 eth0 goldmane [] [] [kns.calico-system ksa.calico-system.goldmane] calie82f99ea9c5 [] [] }} ContainerID="a229e853cf7c26f450ea2e75d492ccfe1300818319c9e458f0e40bc65c1e3a68" Namespace="calico-system" Pod="goldmane-8f77d7b6c-z92z5" WorkloadEndpoint="ip--172--31--29--247-k8s-goldmane--8f77d7b6c--z92z5-" May 17 00:36:06.427606 env[1754]: 2025-05-17 00:36:06.226 [INFO][4495] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="a229e853cf7c26f450ea2e75d492ccfe1300818319c9e458f0e40bc65c1e3a68" Namespace="calico-system" Pod="goldmane-8f77d7b6c-z92z5" WorkloadEndpoint="ip--172--31--29--247-k8s-goldmane--8f77d7b6c--z92z5-eth0" May 17 00:36:06.427606 env[1754]: 2025-05-17 00:36:06.296 [INFO][4509] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a229e853cf7c26f450ea2e75d492ccfe1300818319c9e458f0e40bc65c1e3a68" HandleID="k8s-pod-network.a229e853cf7c26f450ea2e75d492ccfe1300818319c9e458f0e40bc65c1e3a68" Workload="ip--172--31--29--247-k8s-goldmane--8f77d7b6c--z92z5-eth0" May 17 00:36:06.427606 env[1754]: 2025-05-17 00:36:06.297 [INFO][4509] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a229e853cf7c26f450ea2e75d492ccfe1300818319c9e458f0e40bc65c1e3a68" HandleID="k8s-pod-network.a229e853cf7c26f450ea2e75d492ccfe1300818319c9e458f0e40bc65c1e3a68" Workload="ip--172--31--29--247-k8s-goldmane--8f77d7b6c--z92z5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d1630), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-29-247", "pod":"goldmane-8f77d7b6c-z92z5", "timestamp":"2025-05-17 00:36:06.296685501 +0000 UTC"}, Hostname:"ip-172-31-29-247", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:36:06.427606 env[1754]: 2025-05-17 00:36:06.297 [INFO][4509] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:06.427606 env[1754]: 2025-05-17 00:36:06.297 [INFO][4509] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:06.427606 env[1754]: 2025-05-17 00:36:06.297 [INFO][4509] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-29-247' May 17 00:36:06.427606 env[1754]: 2025-05-17 00:36:06.312 [INFO][4509] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.a229e853cf7c26f450ea2e75d492ccfe1300818319c9e458f0e40bc65c1e3a68" host="ip-172-31-29-247" May 17 00:36:06.427606 env[1754]: 2025-05-17 00:36:06.322 [INFO][4509] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-29-247" May 17 00:36:06.427606 env[1754]: 2025-05-17 00:36:06.346 [INFO][4509] ipam/ipam.go 511: Trying affinity for 192.168.127.64/26 host="ip-172-31-29-247" May 17 00:36:06.427606 env[1754]: 2025-05-17 00:36:06.349 [INFO][4509] ipam/ipam.go 158: Attempting to load block cidr=192.168.127.64/26 host="ip-172-31-29-247" May 17 00:36:06.427606 env[1754]: 2025-05-17 00:36:06.353 [INFO][4509] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.127.64/26 host="ip-172-31-29-247" May 17 00:36:06.427606 env[1754]: 2025-05-17 00:36:06.353 [INFO][4509] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.127.64/26 handle="k8s-pod-network.a229e853cf7c26f450ea2e75d492ccfe1300818319c9e458f0e40bc65c1e3a68" host="ip-172-31-29-247" May 17 00:36:06.427606 env[1754]: 2025-05-17 00:36:06.357 [INFO][4509] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.a229e853cf7c26f450ea2e75d492ccfe1300818319c9e458f0e40bc65c1e3a68 May 17 00:36:06.427606 env[1754]: 2025-05-17 00:36:06.364 [INFO][4509] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.127.64/26 handle="k8s-pod-network.a229e853cf7c26f450ea2e75d492ccfe1300818319c9e458f0e40bc65c1e3a68" host="ip-172-31-29-247" May 17 00:36:06.427606 env[1754]: 2025-05-17 00:36:06.381 [INFO][4509] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.127.67/26] block=192.168.127.64/26 handle="k8s-pod-network.a229e853cf7c26f450ea2e75d492ccfe1300818319c9e458f0e40bc65c1e3a68" host="ip-172-31-29-247" May 17 00:36:06.427606 env[1754]: 2025-05-17 00:36:06.381 [INFO][4509] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.127.67/26] handle="k8s-pod-network.a229e853cf7c26f450ea2e75d492ccfe1300818319c9e458f0e40bc65c1e3a68" host="ip-172-31-29-247" May 17 00:36:06.427606 env[1754]: 2025-05-17 00:36:06.381 [INFO][4509] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:06.427606 env[1754]: 2025-05-17 00:36:06.381 [INFO][4509] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.127.67/26] IPv6=[] ContainerID="a229e853cf7c26f450ea2e75d492ccfe1300818319c9e458f0e40bc65c1e3a68" HandleID="k8s-pod-network.a229e853cf7c26f450ea2e75d492ccfe1300818319c9e458f0e40bc65c1e3a68" Workload="ip--172--31--29--247-k8s-goldmane--8f77d7b6c--z92z5-eth0" May 17 00:36:06.428672 env[1754]: 2025-05-17 00:36:06.384 [INFO][4495] cni-plugin/k8s.go 418: Populated endpoint ContainerID="a229e853cf7c26f450ea2e75d492ccfe1300818319c9e458f0e40bc65c1e3a68" Namespace="calico-system" Pod="goldmane-8f77d7b6c-z92z5" WorkloadEndpoint="ip--172--31--29--247-k8s-goldmane--8f77d7b6c--z92z5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--29--247-k8s-goldmane--8f77d7b6c--z92z5-eth0", GenerateName:"goldmane-8f77d7b6c-", Namespace:"calico-system", SelfLink:"", UID:"b130376b-e592-4257-8150-fa1595d1cccd", ResourceVersion:"946", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"8f77d7b6c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-29-247", ContainerID:"", Pod:"goldmane-8f77d7b6c-z92z5", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.127.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calie82f99ea9c5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:06.428672 env[1754]: 2025-05-17 00:36:06.384 [INFO][4495] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.127.67/32] ContainerID="a229e853cf7c26f450ea2e75d492ccfe1300818319c9e458f0e40bc65c1e3a68" Namespace="calico-system" Pod="goldmane-8f77d7b6c-z92z5" WorkloadEndpoint="ip--172--31--29--247-k8s-goldmane--8f77d7b6c--z92z5-eth0" May 17 00:36:06.428672 env[1754]: 2025-05-17 00:36:06.384 [INFO][4495] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie82f99ea9c5 ContainerID="a229e853cf7c26f450ea2e75d492ccfe1300818319c9e458f0e40bc65c1e3a68" Namespace="calico-system" Pod="goldmane-8f77d7b6c-z92z5" WorkloadEndpoint="ip--172--31--29--247-k8s-goldmane--8f77d7b6c--z92z5-eth0" May 17 00:36:06.428672 env[1754]: 2025-05-17 00:36:06.404 [INFO][4495] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a229e853cf7c26f450ea2e75d492ccfe1300818319c9e458f0e40bc65c1e3a68" Namespace="calico-system" Pod="goldmane-8f77d7b6c-z92z5" WorkloadEndpoint="ip--172--31--29--247-k8s-goldmane--8f77d7b6c--z92z5-eth0" May 17 00:36:06.428672 env[1754]: 2025-05-17 00:36:06.404 [INFO][4495] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="a229e853cf7c26f450ea2e75d492ccfe1300818319c9e458f0e40bc65c1e3a68" Namespace="calico-system" Pod="goldmane-8f77d7b6c-z92z5" WorkloadEndpoint="ip--172--31--29--247-k8s-goldmane--8f77d7b6c--z92z5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--29--247-k8s-goldmane--8f77d7b6c--z92z5-eth0", GenerateName:"goldmane-8f77d7b6c-", Namespace:"calico-system", SelfLink:"", UID:"b130376b-e592-4257-8150-fa1595d1cccd", ResourceVersion:"946", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"8f77d7b6c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-29-247", ContainerID:"a229e853cf7c26f450ea2e75d492ccfe1300818319c9e458f0e40bc65c1e3a68", Pod:"goldmane-8f77d7b6c-z92z5", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.127.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calie82f99ea9c5", MAC:"06:0c:13:ac:1f:b5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:06.428672 env[1754]: 2025-05-17 00:36:06.424 [INFO][4495] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="a229e853cf7c26f450ea2e75d492ccfe1300818319c9e458f0e40bc65c1e3a68" Namespace="calico-system" Pod="goldmane-8f77d7b6c-z92z5" WorkloadEndpoint="ip--172--31--29--247-k8s-goldmane--8f77d7b6c--z92z5-eth0" May 17 00:36:06.449809 env[1754]: time="2025-05-17T00:36:06.449694483Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:36:06.453509 env[1754]: time="2025-05-17T00:36:06.450550403Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:36:06.453895 env[1754]: time="2025-05-17T00:36:06.453827727Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:36:06.454362 env[1754]: time="2025-05-17T00:36:06.454315658Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a229e853cf7c26f450ea2e75d492ccfe1300818319c9e458f0e40bc65c1e3a68 pid=4529 runtime=io.containerd.runc.v2 May 17 00:36:06.505997 systemd[1]: Started cri-containerd-a229e853cf7c26f450ea2e75d492ccfe1300818319c9e458f0e40bc65c1e3a68.scope. May 17 00:36:06.517228 systemd[1]: Created slice kubepods-besteffort-poddc702640_bf99_40cf_827b_6579c54fc4b2.slice. May 17 00:36:06.531000 audit[4526]: NETFILTER_CFG table=filter:101 family=2 entries=20 op=nft_register_rule pid=4526 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:06.531000 audit[4526]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffdff470c60 a2=0 a3=7ffdff470c4c items=0 ppid=2984 pid=4526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:06.531000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:06.540000 audit[4526]: NETFILTER_CFG table=nat:102 family=2 entries=14 op=nft_register_rule pid=4526 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:06.540000 audit[4526]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffdff470c60 a2=0 a3=0 items=0 ppid=2984 pid=4526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:06.540000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:06.553084 kubelet[2612]: I0517 00:36:06.553026 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2cfrn\" (UniqueName: \"kubernetes.io/projected/dc702640-bf99-40cf-827b-6579c54fc4b2-kube-api-access-2cfrn\") pod \"whisker-6785c57cdd-4bhsp\" (UID: \"dc702640-bf99-40cf-827b-6579c54fc4b2\") " pod="calico-system/whisker-6785c57cdd-4bhsp" May 17 00:36:06.553258 kubelet[2612]: I0517 00:36:06.553107 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/dc702640-bf99-40cf-827b-6579c54fc4b2-whisker-ca-bundle\") pod \"whisker-6785c57cdd-4bhsp\" (UID: \"dc702640-bf99-40cf-827b-6579c54fc4b2\") " pod="calico-system/whisker-6785c57cdd-4bhsp" May 17 00:36:06.553258 kubelet[2612]: I0517 00:36:06.553136 2612 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/dc702640-bf99-40cf-827b-6579c54fc4b2-whisker-backend-key-pair\") pod \"whisker-6785c57cdd-4bhsp\" (UID: \"dc702640-bf99-40cf-827b-6579c54fc4b2\") " pod="calico-system/whisker-6785c57cdd-4bhsp" May 17 00:36:06.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:06.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:06.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:06.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:06.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:06.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:06.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:06.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:06.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:06.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:06.592000 audit: BPF prog-id=157 op=LOAD May 17 00:36:06.593000 audit[4541]: AVC avc: denied { bpf } for pid=4541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:06.593000 audit[4541]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4529 pid=4541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:06.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132323965383533636637633236663435306561326537356434393263 May 17 00:36:06.594000 audit[4541]: AVC avc: denied { perfmon } for pid=4541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:06.594000 audit[4541]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4529 pid=4541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:06.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132323965383533636637633236663435306561326537356434393263 May 17 00:36:06.594000 audit[4541]: AVC avc: denied { bpf } for pid=4541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:06.594000 audit[4541]: AVC avc: denied { bpf } for pid=4541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:06.594000 audit[4541]: AVC avc: denied { bpf } for pid=4541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:06.594000 audit[4541]: AVC avc: denied { perfmon } for pid=4541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:06.594000 audit[4541]: AVC avc: denied { perfmon } for pid=4541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:06.594000 audit[4541]: AVC avc: denied { perfmon } for pid=4541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:06.594000 audit[4541]: AVC avc: denied { perfmon } for pid=4541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:06.594000 audit[4541]: AVC avc: denied { perfmon } for pid=4541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:06.594000 audit[4541]: AVC avc: denied { bpf } for pid=4541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:06.594000 audit[4541]: AVC avc: denied { bpf } for pid=4541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:06.594000 audit: BPF prog-id=158 op=LOAD May 17 00:36:06.594000 audit[4541]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000251ca0 items=0 ppid=4529 pid=4541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:06.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132323965383533636637633236663435306561326537356434393263 May 17 00:36:06.595000 audit[4541]: AVC avc: denied { bpf } for pid=4541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:06.595000 audit[4541]: AVC avc: denied { bpf } for pid=4541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:06.595000 audit[4541]: AVC avc: denied { perfmon } for pid=4541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:06.595000 audit[4541]: AVC avc: denied { perfmon } for pid=4541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:06.595000 audit[4541]: AVC avc: denied { perfmon } for pid=4541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:06.595000 audit[4541]: AVC avc: denied { perfmon } for pid=4541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:06.595000 audit[4541]: AVC avc: denied { perfmon } for pid=4541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:06.595000 audit[4541]: AVC avc: denied { bpf } for pid=4541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:06.595000 audit[4541]: AVC avc: denied { bpf } for pid=4541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:06.595000 audit: BPF prog-id=159 op=LOAD May 17 00:36:06.595000 audit[4541]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000251ce8 items=0 ppid=4529 pid=4541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:06.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132323965383533636637633236663435306561326537356434393263 May 17 00:36:06.598000 audit: BPF prog-id=159 op=UNLOAD May 17 00:36:06.598000 audit: BPF prog-id=158 op=UNLOAD May 17 00:36:06.598000 audit[4541]: AVC avc: denied { bpf } for pid=4541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:06.598000 audit[4541]: AVC avc: denied { bpf } for pid=4541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:06.598000 audit[4541]: AVC avc: denied { bpf } for pid=4541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:06.598000 audit[4541]: AVC avc: denied { perfmon } for pid=4541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:06.598000 audit[4541]: AVC avc: denied { perfmon } for pid=4541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:06.598000 audit[4541]: AVC avc: denied { perfmon } for pid=4541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:06.598000 audit[4541]: AVC avc: denied { perfmon } for pid=4541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:06.598000 audit[4541]: AVC avc: denied { perfmon } for pid=4541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:06.598000 audit[4541]: AVC avc: denied { bpf } for pid=4541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:06.598000 audit[4541]: AVC avc: denied { bpf } for pid=4541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:06.598000 audit: BPF prog-id=160 op=LOAD May 17 00:36:06.598000 audit[4541]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003b80f8 items=0 ppid=4529 pid=4541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:06.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132323965383533636637633236663435306561326537356434393263 May 17 00:36:06.602000 audit[4432]: AVC avc: denied { getattr } for pid=4432 comm="coredns" path="cgroup:[4026532475]" dev="nsfs" ino=4026532475 scontext=system_u:system_r:svirt_lxc_net_t:s0:c399,c670 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 17 00:36:06.602000 audit[4432]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c000156b58 a2=c0000b29f8 a3=0 items=0 ppid=4273 pid=4432 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c399,c670 key=(null) May 17 00:36:06.602000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 17 00:36:06.698132 env[1754]: time="2025-05-17T00:36:06.693755135Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-8f77d7b6c-z92z5,Uid:b130376b-e592-4257-8150-fa1595d1cccd,Namespace:calico-system,Attempt:1,} returns sandbox id \"a229e853cf7c26f450ea2e75d492ccfe1300818319c9e458f0e40bc65c1e3a68\"" May 17 00:36:06.819949 env[1754]: time="2025-05-17T00:36:06.819901541Z" level=info msg="StopPodSandbox for \"01a750803899573c40be663805ebea2c6df21173762de1ba952840c22f39b59d\"" May 17 00:36:06.823383 env[1754]: time="2025-05-17T00:36:06.823324475Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-6785c57cdd-4bhsp,Uid:dc702640-bf99-40cf-827b-6579c54fc4b2,Namespace:calico-system,Attempt:0,}" May 17 00:36:06.824441 env[1754]: time="2025-05-17T00:36:06.824409141Z" level=info msg="StopPodSandbox for \"8afa79ac2027e2b14fc4d680f6c19595ccb9a6c6294cbb7f2c6bbb37c66223ae\"" May 17 00:36:07.035000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.035000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.035000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.035000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.035000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.035000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.035000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.035000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.035000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.035000 audit: BPF prog-id=161 op=LOAD May 17 00:36:07.035000 audit[4639]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdcea98420 a2=98 a3=3 items=0 ppid=4369 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:07.035000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:07.038000 audit: BPF prog-id=161 op=UNLOAD May 17 00:36:07.046000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.046000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.046000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.046000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.046000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.046000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.046000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.046000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.046000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.046000 audit: BPF prog-id=162 op=LOAD May 17 00:36:07.046000 audit[4639]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdcea98210 a2=94 a3=54428f items=0 ppid=4369 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:07.046000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:07.051000 audit: BPF prog-id=162 op=UNLOAD May 17 00:36:07.051000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.051000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.051000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.051000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.051000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.051000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.051000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.051000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.051000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.051000 audit: BPF prog-id=163 op=LOAD May 17 00:36:07.051000 audit[4639]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdcea98240 a2=94 a3=2 items=0 ppid=4369 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:07.051000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:07.053000 audit: BPF prog-id=163 op=UNLOAD May 17 00:36:07.246948 systemd-networkd[1462]: calie59b1e223dd: Gained IPv6LL May 17 00:36:07.311470 env[1754]: 2025-05-17 00:36:07.137 [INFO][4612] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8afa79ac2027e2b14fc4d680f6c19595ccb9a6c6294cbb7f2c6bbb37c66223ae" May 17 00:36:07.311470 env[1754]: 2025-05-17 00:36:07.138 [INFO][4612] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="8afa79ac2027e2b14fc4d680f6c19595ccb9a6c6294cbb7f2c6bbb37c66223ae" iface="eth0" netns="/var/run/netns/cni-aae4d0cf-f031-f982-8d85-ef2301cc7006" May 17 00:36:07.311470 env[1754]: 2025-05-17 00:36:07.138 [INFO][4612] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="8afa79ac2027e2b14fc4d680f6c19595ccb9a6c6294cbb7f2c6bbb37c66223ae" iface="eth0" netns="/var/run/netns/cni-aae4d0cf-f031-f982-8d85-ef2301cc7006" May 17 00:36:07.311470 env[1754]: 2025-05-17 00:36:07.138 [INFO][4612] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="8afa79ac2027e2b14fc4d680f6c19595ccb9a6c6294cbb7f2c6bbb37c66223ae" iface="eth0" netns="/var/run/netns/cni-aae4d0cf-f031-f982-8d85-ef2301cc7006" May 17 00:36:07.311470 env[1754]: 2025-05-17 00:36:07.138 [INFO][4612] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8afa79ac2027e2b14fc4d680f6c19595ccb9a6c6294cbb7f2c6bbb37c66223ae" May 17 00:36:07.311470 env[1754]: 2025-05-17 00:36:07.138 [INFO][4612] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8afa79ac2027e2b14fc4d680f6c19595ccb9a6c6294cbb7f2c6bbb37c66223ae" May 17 00:36:07.311470 env[1754]: 2025-05-17 00:36:07.253 [INFO][4645] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8afa79ac2027e2b14fc4d680f6c19595ccb9a6c6294cbb7f2c6bbb37c66223ae" HandleID="k8s-pod-network.8afa79ac2027e2b14fc4d680f6c19595ccb9a6c6294cbb7f2c6bbb37c66223ae" Workload="ip--172--31--29--247-k8s-csi--node--driver--z4dbv-eth0" May 17 00:36:07.311470 env[1754]: 2025-05-17 00:36:07.253 [INFO][4645] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:07.311470 env[1754]: 2025-05-17 00:36:07.253 [INFO][4645] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:07.311470 env[1754]: 2025-05-17 00:36:07.274 [WARNING][4645] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8afa79ac2027e2b14fc4d680f6c19595ccb9a6c6294cbb7f2c6bbb37c66223ae" HandleID="k8s-pod-network.8afa79ac2027e2b14fc4d680f6c19595ccb9a6c6294cbb7f2c6bbb37c66223ae" Workload="ip--172--31--29--247-k8s-csi--node--driver--z4dbv-eth0" May 17 00:36:07.311470 env[1754]: 2025-05-17 00:36:07.274 [INFO][4645] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8afa79ac2027e2b14fc4d680f6c19595ccb9a6c6294cbb7f2c6bbb37c66223ae" HandleID="k8s-pod-network.8afa79ac2027e2b14fc4d680f6c19595ccb9a6c6294cbb7f2c6bbb37c66223ae" Workload="ip--172--31--29--247-k8s-csi--node--driver--z4dbv-eth0" May 17 00:36:07.311470 env[1754]: 2025-05-17 00:36:07.301 [INFO][4645] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:07.311470 env[1754]: 2025-05-17 00:36:07.304 [INFO][4612] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8afa79ac2027e2b14fc4d680f6c19595ccb9a6c6294cbb7f2c6bbb37c66223ae" May 17 00:36:07.313460 env[1754]: time="2025-05-17T00:36:07.313406822Z" level=info msg="TearDown network for sandbox \"8afa79ac2027e2b14fc4d680f6c19595ccb9a6c6294cbb7f2c6bbb37c66223ae\" successfully" May 17 00:36:07.313620 env[1754]: time="2025-05-17T00:36:07.313596170Z" level=info msg="StopPodSandbox for \"8afa79ac2027e2b14fc4d680f6c19595ccb9a6c6294cbb7f2c6bbb37c66223ae\" returns successfully" May 17 00:36:07.314547 env[1754]: time="2025-05-17T00:36:07.314510418Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-z4dbv,Uid:125bc07b-a5e7-420d-bbe5-934e8bac8b88,Namespace:calico-system,Attempt:1,}" May 17 00:36:07.315824 systemd[1]: run-netns-cni\x2daae4d0cf\x2df031\x2df982\x2d8d85\x2def2301cc7006.mount: Deactivated successfully. May 17 00:36:07.412837 env[1754]: 2025-05-17 00:36:07.147 [INFO][4610] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="01a750803899573c40be663805ebea2c6df21173762de1ba952840c22f39b59d" May 17 00:36:07.412837 env[1754]: 2025-05-17 00:36:07.147 [INFO][4610] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="01a750803899573c40be663805ebea2c6df21173762de1ba952840c22f39b59d" iface="eth0" netns="/var/run/netns/cni-0936d63b-f38d-53b3-d341-9ac5edf42e7f" May 17 00:36:07.412837 env[1754]: 2025-05-17 00:36:07.147 [INFO][4610] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="01a750803899573c40be663805ebea2c6df21173762de1ba952840c22f39b59d" iface="eth0" netns="/var/run/netns/cni-0936d63b-f38d-53b3-d341-9ac5edf42e7f" May 17 00:36:07.412837 env[1754]: 2025-05-17 00:36:07.148 [INFO][4610] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="01a750803899573c40be663805ebea2c6df21173762de1ba952840c22f39b59d" iface="eth0" netns="/var/run/netns/cni-0936d63b-f38d-53b3-d341-9ac5edf42e7f" May 17 00:36:07.412837 env[1754]: 2025-05-17 00:36:07.148 [INFO][4610] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="01a750803899573c40be663805ebea2c6df21173762de1ba952840c22f39b59d" May 17 00:36:07.412837 env[1754]: 2025-05-17 00:36:07.148 [INFO][4610] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="01a750803899573c40be663805ebea2c6df21173762de1ba952840c22f39b59d" May 17 00:36:07.412837 env[1754]: 2025-05-17 00:36:07.311 [INFO][4643] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="01a750803899573c40be663805ebea2c6df21173762de1ba952840c22f39b59d" HandleID="k8s-pod-network.01a750803899573c40be663805ebea2c6df21173762de1ba952840c22f39b59d" Workload="ip--172--31--29--247-k8s-coredns--7c65d6cfc9--ghjvq-eth0" May 17 00:36:07.412837 env[1754]: 2025-05-17 00:36:07.311 [INFO][4643] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:07.412837 env[1754]: 2025-05-17 00:36:07.311 [INFO][4643] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:07.412837 env[1754]: 2025-05-17 00:36:07.373 [WARNING][4643] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="01a750803899573c40be663805ebea2c6df21173762de1ba952840c22f39b59d" HandleID="k8s-pod-network.01a750803899573c40be663805ebea2c6df21173762de1ba952840c22f39b59d" Workload="ip--172--31--29--247-k8s-coredns--7c65d6cfc9--ghjvq-eth0" May 17 00:36:07.412837 env[1754]: 2025-05-17 00:36:07.374 [INFO][4643] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="01a750803899573c40be663805ebea2c6df21173762de1ba952840c22f39b59d" HandleID="k8s-pod-network.01a750803899573c40be663805ebea2c6df21173762de1ba952840c22f39b59d" Workload="ip--172--31--29--247-k8s-coredns--7c65d6cfc9--ghjvq-eth0" May 17 00:36:07.412837 env[1754]: 2025-05-17 00:36:07.385 [INFO][4643] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:07.412837 env[1754]: 2025-05-17 00:36:07.405 [INFO][4610] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="01a750803899573c40be663805ebea2c6df21173762de1ba952840c22f39b59d" May 17 00:36:07.413886 env[1754]: time="2025-05-17T00:36:07.413843319Z" level=info msg="TearDown network for sandbox \"01a750803899573c40be663805ebea2c6df21173762de1ba952840c22f39b59d\" successfully" May 17 00:36:07.414018 env[1754]: time="2025-05-17T00:36:07.413998473Z" level=info msg="StopPodSandbox for \"01a750803899573c40be663805ebea2c6df21173762de1ba952840c22f39b59d\" returns successfully" May 17 00:36:07.416940 env[1754]: time="2025-05-17T00:36:07.416898365Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-ghjvq,Uid:2a2f6310-2a87-41d3-811a-8205ae62507b,Namespace:kube-system,Attempt:1,}" May 17 00:36:07.417249 systemd[1]: run-netns-cni\x2d0936d63b\x2df38d\x2d53b3\x2dd341\x2d9ac5edf42e7f.mount: Deactivated successfully. May 17 00:36:07.472000 audit[4679]: NETFILTER_CFG table=filter:103 family=2 entries=17 op=nft_register_rule pid=4679 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:07.472000 audit[4679]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff8ac0dd70 a2=0 a3=7fff8ac0dd5c items=0 ppid=2984 pid=4679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:07.472000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:07.495000 audit[4679]: NETFILTER_CFG table=nat:104 family=2 entries=35 op=nft_register_chain pid=4679 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:07.495000 audit[4679]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fff8ac0dd70 a2=0 a3=7fff8ac0dd5c items=0 ppid=2984 pid=4679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:07.495000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:07.510359 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:36:07.510483 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali990a7a2bcf4: link becomes ready May 17 00:36:07.510307 systemd-networkd[1462]: cali990a7a2bcf4: Link UP May 17 00:36:07.510507 systemd-networkd[1462]: cali990a7a2bcf4: Gained carrier May 17 00:36:07.560614 env[1754]: 2025-05-17 00:36:07.130 [INFO][4616] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--29--247-k8s-whisker--6785c57cdd--4bhsp-eth0 whisker-6785c57cdd- calico-system dc702640-bf99-40cf-827b-6579c54fc4b2 969 0 2025-05-17 00:36:06 +0000 UTC map[app.kubernetes.io/name:whisker k8s-app:whisker pod-template-hash:6785c57cdd projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:whisker] map[] [] [] []} {k8s ip-172-31-29-247 whisker-6785c57cdd-4bhsp eth0 whisker [] [] [kns.calico-system ksa.calico-system.whisker] cali990a7a2bcf4 [] [] }} ContainerID="f271ed6dc7686ae4b1784e51945c82dd83ad6a45b7def347ddbd368972ba5fa6" Namespace="calico-system" Pod="whisker-6785c57cdd-4bhsp" WorkloadEndpoint="ip--172--31--29--247-k8s-whisker--6785c57cdd--4bhsp-" May 17 00:36:07.560614 env[1754]: 2025-05-17 00:36:07.130 [INFO][4616] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="f271ed6dc7686ae4b1784e51945c82dd83ad6a45b7def347ddbd368972ba5fa6" Namespace="calico-system" Pod="whisker-6785c57cdd-4bhsp" WorkloadEndpoint="ip--172--31--29--247-k8s-whisker--6785c57cdd--4bhsp-eth0" May 17 00:36:07.560614 env[1754]: 2025-05-17 00:36:07.330 [INFO][4653] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f271ed6dc7686ae4b1784e51945c82dd83ad6a45b7def347ddbd368972ba5fa6" HandleID="k8s-pod-network.f271ed6dc7686ae4b1784e51945c82dd83ad6a45b7def347ddbd368972ba5fa6" Workload="ip--172--31--29--247-k8s-whisker--6785c57cdd--4bhsp-eth0" May 17 00:36:07.560614 env[1754]: 2025-05-17 00:36:07.330 [INFO][4653] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f271ed6dc7686ae4b1784e51945c82dd83ad6a45b7def347ddbd368972ba5fa6" HandleID="k8s-pod-network.f271ed6dc7686ae4b1784e51945c82dd83ad6a45b7def347ddbd368972ba5fa6" Workload="ip--172--31--29--247-k8s-whisker--6785c57cdd--4bhsp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003f8d30), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-29-247", "pod":"whisker-6785c57cdd-4bhsp", "timestamp":"2025-05-17 00:36:07.330351166 +0000 UTC"}, Hostname:"ip-172-31-29-247", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:36:07.560614 env[1754]: 2025-05-17 00:36:07.330 [INFO][4653] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:07.560614 env[1754]: 2025-05-17 00:36:07.383 [INFO][4653] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:07.560614 env[1754]: 2025-05-17 00:36:07.384 [INFO][4653] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-29-247' May 17 00:36:07.560614 env[1754]: 2025-05-17 00:36:07.397 [INFO][4653] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.f271ed6dc7686ae4b1784e51945c82dd83ad6a45b7def347ddbd368972ba5fa6" host="ip-172-31-29-247" May 17 00:36:07.560614 env[1754]: 2025-05-17 00:36:07.410 [INFO][4653] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-29-247" May 17 00:36:07.560614 env[1754]: 2025-05-17 00:36:07.444 [INFO][4653] ipam/ipam.go 511: Trying affinity for 192.168.127.64/26 host="ip-172-31-29-247" May 17 00:36:07.560614 env[1754]: 2025-05-17 00:36:07.450 [INFO][4653] ipam/ipam.go 158: Attempting to load block cidr=192.168.127.64/26 host="ip-172-31-29-247" May 17 00:36:07.560614 env[1754]: 2025-05-17 00:36:07.461 [INFO][4653] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.127.64/26 host="ip-172-31-29-247" May 17 00:36:07.560614 env[1754]: 2025-05-17 00:36:07.461 [INFO][4653] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.127.64/26 handle="k8s-pod-network.f271ed6dc7686ae4b1784e51945c82dd83ad6a45b7def347ddbd368972ba5fa6" host="ip-172-31-29-247" May 17 00:36:07.560614 env[1754]: 2025-05-17 00:36:07.465 [INFO][4653] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.f271ed6dc7686ae4b1784e51945c82dd83ad6a45b7def347ddbd368972ba5fa6 May 17 00:36:07.560614 env[1754]: 2025-05-17 00:36:07.479 [INFO][4653] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.127.64/26 handle="k8s-pod-network.f271ed6dc7686ae4b1784e51945c82dd83ad6a45b7def347ddbd368972ba5fa6" host="ip-172-31-29-247" May 17 00:36:07.560614 env[1754]: 2025-05-17 00:36:07.491 [INFO][4653] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.127.68/26] block=192.168.127.64/26 handle="k8s-pod-network.f271ed6dc7686ae4b1784e51945c82dd83ad6a45b7def347ddbd368972ba5fa6" host="ip-172-31-29-247" May 17 00:36:07.560614 env[1754]: 2025-05-17 00:36:07.491 [INFO][4653] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.127.68/26] handle="k8s-pod-network.f271ed6dc7686ae4b1784e51945c82dd83ad6a45b7def347ddbd368972ba5fa6" host="ip-172-31-29-247" May 17 00:36:07.560614 env[1754]: 2025-05-17 00:36:07.491 [INFO][4653] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:07.560614 env[1754]: 2025-05-17 00:36:07.491 [INFO][4653] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.127.68/26] IPv6=[] ContainerID="f271ed6dc7686ae4b1784e51945c82dd83ad6a45b7def347ddbd368972ba5fa6" HandleID="k8s-pod-network.f271ed6dc7686ae4b1784e51945c82dd83ad6a45b7def347ddbd368972ba5fa6" Workload="ip--172--31--29--247-k8s-whisker--6785c57cdd--4bhsp-eth0" May 17 00:36:07.561802 env[1754]: 2025-05-17 00:36:07.499 [INFO][4616] cni-plugin/k8s.go 418: Populated endpoint ContainerID="f271ed6dc7686ae4b1784e51945c82dd83ad6a45b7def347ddbd368972ba5fa6" Namespace="calico-system" Pod="whisker-6785c57cdd-4bhsp" WorkloadEndpoint="ip--172--31--29--247-k8s-whisker--6785c57cdd--4bhsp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--29--247-k8s-whisker--6785c57cdd--4bhsp-eth0", GenerateName:"whisker-6785c57cdd-", Namespace:"calico-system", SelfLink:"", UID:"dc702640-bf99-40cf-827b-6579c54fc4b2", ResourceVersion:"969", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 36, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"6785c57cdd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-29-247", ContainerID:"", Pod:"whisker-6785c57cdd-4bhsp", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.127.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali990a7a2bcf4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:07.561802 env[1754]: 2025-05-17 00:36:07.505 [INFO][4616] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.127.68/32] ContainerID="f271ed6dc7686ae4b1784e51945c82dd83ad6a45b7def347ddbd368972ba5fa6" Namespace="calico-system" Pod="whisker-6785c57cdd-4bhsp" WorkloadEndpoint="ip--172--31--29--247-k8s-whisker--6785c57cdd--4bhsp-eth0" May 17 00:36:07.561802 env[1754]: 2025-05-17 00:36:07.506 [INFO][4616] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali990a7a2bcf4 ContainerID="f271ed6dc7686ae4b1784e51945c82dd83ad6a45b7def347ddbd368972ba5fa6" Namespace="calico-system" Pod="whisker-6785c57cdd-4bhsp" WorkloadEndpoint="ip--172--31--29--247-k8s-whisker--6785c57cdd--4bhsp-eth0" May 17 00:36:07.561802 env[1754]: 2025-05-17 00:36:07.511 [INFO][4616] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f271ed6dc7686ae4b1784e51945c82dd83ad6a45b7def347ddbd368972ba5fa6" Namespace="calico-system" Pod="whisker-6785c57cdd-4bhsp" WorkloadEndpoint="ip--172--31--29--247-k8s-whisker--6785c57cdd--4bhsp-eth0" May 17 00:36:07.561802 env[1754]: 2025-05-17 00:36:07.517 [INFO][4616] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="f271ed6dc7686ae4b1784e51945c82dd83ad6a45b7def347ddbd368972ba5fa6" Namespace="calico-system" Pod="whisker-6785c57cdd-4bhsp" WorkloadEndpoint="ip--172--31--29--247-k8s-whisker--6785c57cdd--4bhsp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--29--247-k8s-whisker--6785c57cdd--4bhsp-eth0", GenerateName:"whisker-6785c57cdd-", Namespace:"calico-system", SelfLink:"", UID:"dc702640-bf99-40cf-827b-6579c54fc4b2", ResourceVersion:"969", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 36, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"6785c57cdd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-29-247", ContainerID:"f271ed6dc7686ae4b1784e51945c82dd83ad6a45b7def347ddbd368972ba5fa6", Pod:"whisker-6785c57cdd-4bhsp", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.127.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali990a7a2bcf4", MAC:"b6:20:b8:3d:f9:7c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:07.561802 env[1754]: 2025-05-17 00:36:07.551 [INFO][4616] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="f271ed6dc7686ae4b1784e51945c82dd83ad6a45b7def347ddbd368972ba5fa6" Namespace="calico-system" Pod="whisker-6785c57cdd-4bhsp" WorkloadEndpoint="ip--172--31--29--247-k8s-whisker--6785c57cdd--4bhsp-eth0" May 17 00:36:07.631261 systemd-networkd[1462]: cali03cfdfc282b: Gained IPv6LL May 17 00:36:07.672781 env[1754]: time="2025-05-17T00:36:07.672280785Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:36:07.672781 env[1754]: time="2025-05-17T00:36:07.672342524Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:36:07.672781 env[1754]: time="2025-05-17T00:36:07.672359268Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:36:07.672781 env[1754]: time="2025-05-17T00:36:07.672529195Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f271ed6dc7686ae4b1784e51945c82dd83ad6a45b7def347ddbd368972ba5fa6 pid=4737 runtime=io.containerd.runc.v2 May 17 00:36:07.723102 systemd[1]: Started cri-containerd-f271ed6dc7686ae4b1784e51945c82dd83ad6a45b7def347ddbd368972ba5fa6.scope. May 17 00:36:07.744619 systemd-networkd[1462]: cali2971f166c1c: Link UP May 17 00:36:07.753545 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2971f166c1c: link becomes ready May 17 00:36:07.752439 systemd-networkd[1462]: cali2971f166c1c: Gained carrier May 17 00:36:07.806235 env[1754]: 2025-05-17 00:36:07.480 [INFO][4667] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--29--247-k8s-csi--node--driver--z4dbv-eth0 csi-node-driver- calico-system 125bc07b-a5e7-420d-bbe5-934e8bac8b88 976 0 2025-05-17 00:35:41 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:68bf44dd5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ip-172-31-29-247 csi-node-driver-z4dbv eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali2971f166c1c [] [] }} ContainerID="82f13bf8c95d4d3887a47b332c9736d1000ee88023cae585574a692ec91abd62" Namespace="calico-system" Pod="csi-node-driver-z4dbv" WorkloadEndpoint="ip--172--31--29--247-k8s-csi--node--driver--z4dbv-" May 17 00:36:07.806235 env[1754]: 2025-05-17 00:36:07.480 [INFO][4667] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="82f13bf8c95d4d3887a47b332c9736d1000ee88023cae585574a692ec91abd62" Namespace="calico-system" Pod="csi-node-driver-z4dbv" WorkloadEndpoint="ip--172--31--29--247-k8s-csi--node--driver--z4dbv-eth0" May 17 00:36:07.806235 env[1754]: 2025-05-17 00:36:07.613 [INFO][4709] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="82f13bf8c95d4d3887a47b332c9736d1000ee88023cae585574a692ec91abd62" HandleID="k8s-pod-network.82f13bf8c95d4d3887a47b332c9736d1000ee88023cae585574a692ec91abd62" Workload="ip--172--31--29--247-k8s-csi--node--driver--z4dbv-eth0" May 17 00:36:07.806235 env[1754]: 2025-05-17 00:36:07.614 [INFO][4709] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="82f13bf8c95d4d3887a47b332c9736d1000ee88023cae585574a692ec91abd62" HandleID="k8s-pod-network.82f13bf8c95d4d3887a47b332c9736d1000ee88023cae585574a692ec91abd62" Workload="ip--172--31--29--247-k8s-csi--node--driver--z4dbv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002e3630), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-29-247", "pod":"csi-node-driver-z4dbv", "timestamp":"2025-05-17 00:36:07.613223622 +0000 UTC"}, Hostname:"ip-172-31-29-247", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:36:07.806235 env[1754]: 2025-05-17 00:36:07.615 [INFO][4709] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:07.806235 env[1754]: 2025-05-17 00:36:07.615 [INFO][4709] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:07.806235 env[1754]: 2025-05-17 00:36:07.615 [INFO][4709] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-29-247' May 17 00:36:07.806235 env[1754]: 2025-05-17 00:36:07.628 [INFO][4709] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.82f13bf8c95d4d3887a47b332c9736d1000ee88023cae585574a692ec91abd62" host="ip-172-31-29-247" May 17 00:36:07.806235 env[1754]: 2025-05-17 00:36:07.635 [INFO][4709] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-29-247" May 17 00:36:07.806235 env[1754]: 2025-05-17 00:36:07.657 [INFO][4709] ipam/ipam.go 511: Trying affinity for 192.168.127.64/26 host="ip-172-31-29-247" May 17 00:36:07.806235 env[1754]: 2025-05-17 00:36:07.665 [INFO][4709] ipam/ipam.go 158: Attempting to load block cidr=192.168.127.64/26 host="ip-172-31-29-247" May 17 00:36:07.806235 env[1754]: 2025-05-17 00:36:07.674 [INFO][4709] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.127.64/26 host="ip-172-31-29-247" May 17 00:36:07.806235 env[1754]: 2025-05-17 00:36:07.680 [INFO][4709] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.127.64/26 handle="k8s-pod-network.82f13bf8c95d4d3887a47b332c9736d1000ee88023cae585574a692ec91abd62" host="ip-172-31-29-247" May 17 00:36:07.806235 env[1754]: 2025-05-17 00:36:07.688 [INFO][4709] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.82f13bf8c95d4d3887a47b332c9736d1000ee88023cae585574a692ec91abd62 May 17 00:36:07.806235 env[1754]: 2025-05-17 00:36:07.698 [INFO][4709] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.127.64/26 handle="k8s-pod-network.82f13bf8c95d4d3887a47b332c9736d1000ee88023cae585574a692ec91abd62" host="ip-172-31-29-247" May 17 00:36:07.806235 env[1754]: 2025-05-17 00:36:07.714 [INFO][4709] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.127.69/26] block=192.168.127.64/26 handle="k8s-pod-network.82f13bf8c95d4d3887a47b332c9736d1000ee88023cae585574a692ec91abd62" host="ip-172-31-29-247" May 17 00:36:07.806235 env[1754]: 2025-05-17 00:36:07.714 [INFO][4709] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.127.69/26] handle="k8s-pod-network.82f13bf8c95d4d3887a47b332c9736d1000ee88023cae585574a692ec91abd62" host="ip-172-31-29-247" May 17 00:36:07.806235 env[1754]: 2025-05-17 00:36:07.716 [INFO][4709] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:07.806235 env[1754]: 2025-05-17 00:36:07.716 [INFO][4709] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.127.69/26] IPv6=[] ContainerID="82f13bf8c95d4d3887a47b332c9736d1000ee88023cae585574a692ec91abd62" HandleID="k8s-pod-network.82f13bf8c95d4d3887a47b332c9736d1000ee88023cae585574a692ec91abd62" Workload="ip--172--31--29--247-k8s-csi--node--driver--z4dbv-eth0" May 17 00:36:07.807566 env[1754]: 2025-05-17 00:36:07.734 [INFO][4667] cni-plugin/k8s.go 418: Populated endpoint ContainerID="82f13bf8c95d4d3887a47b332c9736d1000ee88023cae585574a692ec91abd62" Namespace="calico-system" Pod="csi-node-driver-z4dbv" WorkloadEndpoint="ip--172--31--29--247-k8s-csi--node--driver--z4dbv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--29--247-k8s-csi--node--driver--z4dbv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"125bc07b-a5e7-420d-bbe5-934e8bac8b88", ResourceVersion:"976", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"68bf44dd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-29-247", ContainerID:"", Pod:"csi-node-driver-z4dbv", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.127.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali2971f166c1c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:07.807566 env[1754]: 2025-05-17 00:36:07.742 [INFO][4667] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.127.69/32] ContainerID="82f13bf8c95d4d3887a47b332c9736d1000ee88023cae585574a692ec91abd62" Namespace="calico-system" Pod="csi-node-driver-z4dbv" WorkloadEndpoint="ip--172--31--29--247-k8s-csi--node--driver--z4dbv-eth0" May 17 00:36:07.807566 env[1754]: 2025-05-17 00:36:07.742 [INFO][4667] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2971f166c1c ContainerID="82f13bf8c95d4d3887a47b332c9736d1000ee88023cae585574a692ec91abd62" Namespace="calico-system" Pod="csi-node-driver-z4dbv" WorkloadEndpoint="ip--172--31--29--247-k8s-csi--node--driver--z4dbv-eth0" May 17 00:36:07.807566 env[1754]: 2025-05-17 00:36:07.763 [INFO][4667] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="82f13bf8c95d4d3887a47b332c9736d1000ee88023cae585574a692ec91abd62" Namespace="calico-system" Pod="csi-node-driver-z4dbv" WorkloadEndpoint="ip--172--31--29--247-k8s-csi--node--driver--z4dbv-eth0" May 17 00:36:07.807566 env[1754]: 2025-05-17 00:36:07.764 [INFO][4667] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="82f13bf8c95d4d3887a47b332c9736d1000ee88023cae585574a692ec91abd62" Namespace="calico-system" Pod="csi-node-driver-z4dbv" WorkloadEndpoint="ip--172--31--29--247-k8s-csi--node--driver--z4dbv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--29--247-k8s-csi--node--driver--z4dbv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"125bc07b-a5e7-420d-bbe5-934e8bac8b88", ResourceVersion:"976", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"68bf44dd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-29-247", ContainerID:"82f13bf8c95d4d3887a47b332c9736d1000ee88023cae585574a692ec91abd62", Pod:"csi-node-driver-z4dbv", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.127.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali2971f166c1c", MAC:"b6:37:81:b0:8d:c6", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:07.807566 env[1754]: 2025-05-17 00:36:07.800 [INFO][4667] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="82f13bf8c95d4d3887a47b332c9736d1000ee88023cae585574a692ec91abd62" Namespace="calico-system" Pod="csi-node-driver-z4dbv" WorkloadEndpoint="ip--172--31--29--247-k8s-csi--node--driver--z4dbv-eth0" May 17 00:36:07.829147 kubelet[2612]: I0517 00:36:07.829022 2612 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="0aab84c3-8540-487d-9d30-cf21cf4a5388" path="/var/lib/kubelet/pods/0aab84c3-8540-487d-9d30-cf21cf4a5388/volumes" May 17 00:36:07.834508 systemd-networkd[1462]: calie0bfbc8ed3f: Link UP May 17 00:36:07.841734 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie0bfbc8ed3f: link becomes ready May 17 00:36:07.841876 systemd-networkd[1462]: calie0bfbc8ed3f: Gained carrier May 17 00:36:07.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.845000 audit: BPF prog-id=164 op=LOAD May 17 00:36:07.852000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.852000 audit[4748]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4737 pid=4748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:07.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632373165643664633736383661653462313738346535313934356338 May 17 00:36:07.852000 audit[4748]: AVC avc: denied { perfmon } for pid=4748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.852000 audit[4748]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4737 pid=4748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:07.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632373165643664633736383661653462313738346535313934356338 May 17 00:36:07.852000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.852000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.852000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.852000 audit[4748]: AVC avc: denied { perfmon } for pid=4748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.852000 audit[4748]: AVC avc: denied { perfmon } for pid=4748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.852000 audit[4748]: AVC avc: denied { perfmon } for pid=4748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.852000 audit[4748]: AVC avc: denied { perfmon } for pid=4748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.852000 audit[4748]: AVC avc: denied { perfmon } for pid=4748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.852000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.852000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.852000 audit: BPF prog-id=165 op=LOAD May 17 00:36:07.852000 audit[4748]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002135c0 items=0 ppid=4737 pid=4748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:07.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632373165643664633736383661653462313738346535313934356338 May 17 00:36:07.855000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.855000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.855000 audit[4748]: AVC avc: denied { perfmon } for pid=4748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.855000 audit[4748]: AVC avc: denied { perfmon } for pid=4748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.855000 audit[4748]: AVC avc: denied { perfmon } for pid=4748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.855000 audit[4748]: AVC avc: denied { perfmon } for pid=4748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.855000 audit[4748]: AVC avc: denied { perfmon } for pid=4748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.855000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.855000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.855000 audit: BPF prog-id=166 op=LOAD May 17 00:36:07.855000 audit[4748]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000213608 items=0 ppid=4737 pid=4748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:07.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632373165643664633736383661653462313738346535313934356338 May 17 00:36:07.856000 audit: BPF prog-id=166 op=UNLOAD May 17 00:36:07.856000 audit: BPF prog-id=165 op=UNLOAD May 17 00:36:07.856000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.856000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.856000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.856000 audit[4748]: AVC avc: denied { perfmon } for pid=4748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.856000 audit[4748]: AVC avc: denied { perfmon } for pid=4748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.856000 audit[4748]: AVC avc: denied { perfmon } for pid=4748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.856000 audit[4748]: AVC avc: denied { perfmon } for pid=4748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.856000 audit[4748]: AVC avc: denied { perfmon } for pid=4748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.856000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.856000 audit[4748]: AVC avc: denied { bpf } for pid=4748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.856000 audit: BPF prog-id=167 op=LOAD May 17 00:36:07.856000 audit[4748]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000213a18 items=0 ppid=4737 pid=4748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:07.856000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632373165643664633736383661653462313738346535313934356338 May 17 00:36:07.875256 env[1754]: time="2025-05-17T00:36:07.872848845Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:36:07.875256 env[1754]: time="2025-05-17T00:36:07.872906810Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:36:07.875256 env[1754]: time="2025-05-17T00:36:07.872921694Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:36:07.875256 env[1754]: time="2025-05-17T00:36:07.873115471Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/82f13bf8c95d4d3887a47b332c9736d1000ee88023cae585574a692ec91abd62 pid=4781 runtime=io.containerd.runc.v2 May 17 00:36:07.888583 env[1754]: 2025-05-17 00:36:07.601 [INFO][4684] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--29--247-k8s-coredns--7c65d6cfc9--ghjvq-eth0 coredns-7c65d6cfc9- kube-system 2a2f6310-2a87-41d3-811a-8205ae62507b 977 0 2025-05-17 00:34:54 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7c65d6cfc9 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-29-247 coredns-7c65d6cfc9-ghjvq eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calie0bfbc8ed3f [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="c766d46570fb481563ea05b36499a48da3921feff543d890fce9713e76ff4901" Namespace="kube-system" Pod="coredns-7c65d6cfc9-ghjvq" WorkloadEndpoint="ip--172--31--29--247-k8s-coredns--7c65d6cfc9--ghjvq-" May 17 00:36:07.888583 env[1754]: 2025-05-17 00:36:07.601 [INFO][4684] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="c766d46570fb481563ea05b36499a48da3921feff543d890fce9713e76ff4901" Namespace="kube-system" Pod="coredns-7c65d6cfc9-ghjvq" WorkloadEndpoint="ip--172--31--29--247-k8s-coredns--7c65d6cfc9--ghjvq-eth0" May 17 00:36:07.888583 env[1754]: 2025-05-17 00:36:07.705 [INFO][4730] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c766d46570fb481563ea05b36499a48da3921feff543d890fce9713e76ff4901" HandleID="k8s-pod-network.c766d46570fb481563ea05b36499a48da3921feff543d890fce9713e76ff4901" Workload="ip--172--31--29--247-k8s-coredns--7c65d6cfc9--ghjvq-eth0" May 17 00:36:07.888583 env[1754]: 2025-05-17 00:36:07.706 [INFO][4730] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c766d46570fb481563ea05b36499a48da3921feff543d890fce9713e76ff4901" HandleID="k8s-pod-network.c766d46570fb481563ea05b36499a48da3921feff543d890fce9713e76ff4901" Workload="ip--172--31--29--247-k8s-coredns--7c65d6cfc9--ghjvq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d1880), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-29-247", "pod":"coredns-7c65d6cfc9-ghjvq", "timestamp":"2025-05-17 00:36:07.705187296 +0000 UTC"}, Hostname:"ip-172-31-29-247", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:36:07.888583 env[1754]: 2025-05-17 00:36:07.706 [INFO][4730] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:07.888583 env[1754]: 2025-05-17 00:36:07.716 [INFO][4730] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:07.888583 env[1754]: 2025-05-17 00:36:07.716 [INFO][4730] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-29-247' May 17 00:36:07.888583 env[1754]: 2025-05-17 00:36:07.737 [INFO][4730] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.c766d46570fb481563ea05b36499a48da3921feff543d890fce9713e76ff4901" host="ip-172-31-29-247" May 17 00:36:07.888583 env[1754]: 2025-05-17 00:36:07.763 [INFO][4730] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-29-247" May 17 00:36:07.888583 env[1754]: 2025-05-17 00:36:07.783 [INFO][4730] ipam/ipam.go 511: Trying affinity for 192.168.127.64/26 host="ip-172-31-29-247" May 17 00:36:07.888583 env[1754]: 2025-05-17 00:36:07.786 [INFO][4730] ipam/ipam.go 158: Attempting to load block cidr=192.168.127.64/26 host="ip-172-31-29-247" May 17 00:36:07.888583 env[1754]: 2025-05-17 00:36:07.790 [INFO][4730] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.127.64/26 host="ip-172-31-29-247" May 17 00:36:07.888583 env[1754]: 2025-05-17 00:36:07.790 [INFO][4730] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.127.64/26 handle="k8s-pod-network.c766d46570fb481563ea05b36499a48da3921feff543d890fce9713e76ff4901" host="ip-172-31-29-247" May 17 00:36:07.888583 env[1754]: 2025-05-17 00:36:07.796 [INFO][4730] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.c766d46570fb481563ea05b36499a48da3921feff543d890fce9713e76ff4901 May 17 00:36:07.888583 env[1754]: 2025-05-17 00:36:07.810 [INFO][4730] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.127.64/26 handle="k8s-pod-network.c766d46570fb481563ea05b36499a48da3921feff543d890fce9713e76ff4901" host="ip-172-31-29-247" May 17 00:36:07.888583 env[1754]: 2025-05-17 00:36:07.825 [INFO][4730] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.127.70/26] block=192.168.127.64/26 handle="k8s-pod-network.c766d46570fb481563ea05b36499a48da3921feff543d890fce9713e76ff4901" host="ip-172-31-29-247" May 17 00:36:07.888583 env[1754]: 2025-05-17 00:36:07.825 [INFO][4730] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.127.70/26] handle="k8s-pod-network.c766d46570fb481563ea05b36499a48da3921feff543d890fce9713e76ff4901" host="ip-172-31-29-247" May 17 00:36:07.888583 env[1754]: 2025-05-17 00:36:07.825 [INFO][4730] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:07.888583 env[1754]: 2025-05-17 00:36:07.825 [INFO][4730] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.127.70/26] IPv6=[] ContainerID="c766d46570fb481563ea05b36499a48da3921feff543d890fce9713e76ff4901" HandleID="k8s-pod-network.c766d46570fb481563ea05b36499a48da3921feff543d890fce9713e76ff4901" Workload="ip--172--31--29--247-k8s-coredns--7c65d6cfc9--ghjvq-eth0" May 17 00:36:07.889453 env[1754]: 2025-05-17 00:36:07.831 [INFO][4684] cni-plugin/k8s.go 418: Populated endpoint ContainerID="c766d46570fb481563ea05b36499a48da3921feff543d890fce9713e76ff4901" Namespace="kube-system" Pod="coredns-7c65d6cfc9-ghjvq" WorkloadEndpoint="ip--172--31--29--247-k8s-coredns--7c65d6cfc9--ghjvq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--29--247-k8s-coredns--7c65d6cfc9--ghjvq-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"2a2f6310-2a87-41d3-811a-8205ae62507b", ResourceVersion:"977", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 34, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-29-247", ContainerID:"", Pod:"coredns-7c65d6cfc9-ghjvq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.127.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie0bfbc8ed3f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:07.889453 env[1754]: 2025-05-17 00:36:07.831 [INFO][4684] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.127.70/32] ContainerID="c766d46570fb481563ea05b36499a48da3921feff543d890fce9713e76ff4901" Namespace="kube-system" Pod="coredns-7c65d6cfc9-ghjvq" WorkloadEndpoint="ip--172--31--29--247-k8s-coredns--7c65d6cfc9--ghjvq-eth0" May 17 00:36:07.889453 env[1754]: 2025-05-17 00:36:07.831 [INFO][4684] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie0bfbc8ed3f ContainerID="c766d46570fb481563ea05b36499a48da3921feff543d890fce9713e76ff4901" Namespace="kube-system" Pod="coredns-7c65d6cfc9-ghjvq" WorkloadEndpoint="ip--172--31--29--247-k8s-coredns--7c65d6cfc9--ghjvq-eth0" May 17 00:36:07.889453 env[1754]: 2025-05-17 00:36:07.839 [INFO][4684] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c766d46570fb481563ea05b36499a48da3921feff543d890fce9713e76ff4901" Namespace="kube-system" Pod="coredns-7c65d6cfc9-ghjvq" WorkloadEndpoint="ip--172--31--29--247-k8s-coredns--7c65d6cfc9--ghjvq-eth0" May 17 00:36:07.889453 env[1754]: 2025-05-17 00:36:07.844 [INFO][4684] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="c766d46570fb481563ea05b36499a48da3921feff543d890fce9713e76ff4901" Namespace="kube-system" Pod="coredns-7c65d6cfc9-ghjvq" WorkloadEndpoint="ip--172--31--29--247-k8s-coredns--7c65d6cfc9--ghjvq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--29--247-k8s-coredns--7c65d6cfc9--ghjvq-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"2a2f6310-2a87-41d3-811a-8205ae62507b", ResourceVersion:"977", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 34, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-29-247", ContainerID:"c766d46570fb481563ea05b36499a48da3921feff543d890fce9713e76ff4901", Pod:"coredns-7c65d6cfc9-ghjvq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.127.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie0bfbc8ed3f", MAC:"ca:a6:a5:67:34:3a", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:07.889453 env[1754]: 2025-05-17 00:36:07.886 [INFO][4684] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="c766d46570fb481563ea05b36499a48da3921feff543d890fce9713e76ff4901" Namespace="kube-system" Pod="coredns-7c65d6cfc9-ghjvq" WorkloadEndpoint="ip--172--31--29--247-k8s-coredns--7c65d6cfc9--ghjvq-eth0" May 17 00:36:07.912613 systemd[1]: Started cri-containerd-82f13bf8c95d4d3887a47b332c9736d1000ee88023cae585574a692ec91abd62.scope. May 17 00:36:07.922895 env[1754]: time="2025-05-17T00:36:07.922800357Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:36:07.923132 env[1754]: time="2025-05-17T00:36:07.923104079Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:36:07.923239 env[1754]: time="2025-05-17T00:36:07.923219035Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:36:07.923781 env[1754]: time="2025-05-17T00:36:07.923697506Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c766d46570fb481563ea05b36499a48da3921feff543d890fce9713e76ff4901 pid=4814 runtime=io.containerd.runc.v2 May 17 00:36:07.961000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.961000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.961000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.961000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.961000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.961000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.961000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.961000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.961000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.961000 audit: BPF prog-id=168 op=LOAD May 17 00:36:07.961000 audit[4639]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdcea98100 a2=94 a3=1 items=0 ppid=4369 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:07.961000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:07.961000 audit: BPF prog-id=168 op=UNLOAD May 17 00:36:07.961000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.961000 audit[4639]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffdcea981d0 a2=50 a3=7ffdcea982b0 items=0 ppid=4369 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:07.961000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:07.982888 systemd[1]: Started cri-containerd-c766d46570fb481563ea05b36499a48da3921feff543d890fce9713e76ff4901.scope. May 17 00:36:07.998523 kernel: kauditd_printk_skb: 423 callbacks suppressed May 17 00:36:07.998647 kernel: audit: type=1400 audit(1747442167.988:1156): avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.999194 kernel: audit: type=1300 audit(1747442167.988:1156): arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdcea98110 a2=28 a3=0 items=0 ppid=4369 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:07.988000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.988000 audit[4639]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdcea98110 a2=28 a3=0 items=0 ppid=4369 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:07.988000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:08.005245 kernel: audit: type=1327 audit(1747442167.988:1156): proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:08.005349 kernel: audit: type=1400 audit(1747442167.988:1157): avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.988000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.009993 kernel: audit: type=1300 audit(1747442167.988:1157): arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdcea98140 a2=28 a3=0 items=0 ppid=4369 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:07.988000 audit[4639]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdcea98140 a2=28 a3=0 items=0 ppid=4369 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.012251 kernel: audit: type=1327 audit(1747442167.988:1157): proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:07.988000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:08.016087 kernel: audit: type=1400 audit(1747442167.988:1158): avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.988000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.023242 kernel: audit: type=1300 audit(1747442167.988:1158): arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdcea98050 a2=28 a3=0 items=0 ppid=4369 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:07.988000 audit[4639]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdcea98050 a2=28 a3=0 items=0 ppid=4369 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:07.988000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:08.036129 kernel: audit: type=1327 audit(1747442167.988:1158): proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:08.036263 kernel: audit: type=1400 audit(1747442167.988:1159): avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.988000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.988000 audit[4639]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdcea98160 a2=28 a3=0 items=0 ppid=4369 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:07.988000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:07.988000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.988000 audit[4639]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdcea98140 a2=28 a3=0 items=0 ppid=4369 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:07.988000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:07.988000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.988000 audit[4639]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdcea98130 a2=28 a3=0 items=0 ppid=4369 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:07.988000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:07.988000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.988000 audit[4639]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdcea98160 a2=28 a3=0 items=0 ppid=4369 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:07.988000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:07.988000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.988000 audit[4639]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdcea98140 a2=28 a3=0 items=0 ppid=4369 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:07.988000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:07.988000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.988000 audit[4639]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdcea98160 a2=28 a3=0 items=0 ppid=4369 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:07.988000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:07.988000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.988000 audit[4639]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdcea98130 a2=28 a3=0 items=0 ppid=4369 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:07.988000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:07.989000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.989000 audit[4639]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdcea981a0 a2=28 a3=0 items=0 ppid=4369 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:07.989000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:07.989000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.989000 audit[4639]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdcea97f50 a2=50 a3=1 items=0 ppid=4369 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:07.989000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:07.989000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.989000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.989000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.989000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.989000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.989000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.989000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.989000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.989000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.989000 audit: BPF prog-id=169 op=LOAD May 17 00:36:07.989000 audit[4639]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdcea97f50 a2=94 a3=5 items=0 ppid=4369 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:07.989000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:07.993000 audit: BPF prog-id=169 op=UNLOAD May 17 00:36:07.993000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.993000 audit[4639]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdcea98000 a2=50 a3=1 items=0 ppid=4369 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:07.993000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:07.993000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:07.993000 audit[4639]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffdcea98120 a2=4 a3=38 items=0 ppid=4369 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:07.993000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:08.040000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.040000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.040000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.040000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.040000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.040000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.040000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.040000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.040000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.040000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.040000 audit[4639]: AVC avc: denied { confidentiality } for pid=4639 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:08.040000 audit[4639]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdcea98170 a2=94 a3=6 items=0 ppid=4369 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.040000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:08.040000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.040000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.040000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.040000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.040000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.040000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.040000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.040000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.040000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.040000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.040000 audit[4639]: AVC avc: denied { confidentiality } for pid=4639 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:08.040000 audit[4639]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdcea97920 a2=94 a3=88 items=0 ppid=4369 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.040000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:08.041000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.041000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.041000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.041000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.041000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.041000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.041000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.041000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.041000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.041000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.041000 audit[4639]: AVC avc: denied { confidentiality } for pid=4639 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:08.041000 audit[4639]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdcea97920 a2=94 a3=88 items=0 ppid=4369 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.041000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:08.044778 env[1754]: time="2025-05-17T00:36:08.044734925Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-6785c57cdd-4bhsp,Uid:dc702640-bf99-40cf-827b-6579c54fc4b2,Namespace:calico-system,Attempt:0,} returns sandbox id \"f271ed6dc7686ae4b1784e51945c82dd83ad6a45b7def347ddbd368972ba5fa6\"" May 17 00:36:08.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.046000 audit: BPF prog-id=170 op=LOAD May 17 00:36:08.050000 audit[4824]: AVC avc: denied { bpf } for pid=4824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.050000 audit[4824]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4814 pid=4824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.050000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337363664343635373066623438313536336561303562333634393961 May 17 00:36:08.050000 audit[4824]: AVC avc: denied { perfmon } for pid=4824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.050000 audit[4824]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4814 pid=4824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.050000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337363664343635373066623438313536336561303562333634393961 May 17 00:36:08.051000 audit[4824]: AVC avc: denied { bpf } for pid=4824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.051000 audit[4824]: AVC avc: denied { bpf } for pid=4824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.051000 audit[4824]: AVC avc: denied { bpf } for pid=4824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.051000 audit[4824]: AVC avc: denied { perfmon } for pid=4824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.051000 audit[4824]: AVC avc: denied { perfmon } for pid=4824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.051000 audit[4824]: AVC avc: denied { perfmon } for pid=4824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.051000 audit[4824]: AVC avc: denied { perfmon } for pid=4824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.051000 audit[4824]: AVC avc: denied { perfmon } for pid=4824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.051000 audit[4824]: AVC avc: denied { bpf } for pid=4824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.051000 audit[4824]: AVC avc: denied { bpf } for pid=4824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.051000 audit: BPF prog-id=171 op=LOAD May 17 00:36:08.051000 audit[4824]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000216ec0 items=0 ppid=4814 pid=4824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.051000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337363664343635373066623438313536336561303562333634393961 May 17 00:36:08.052000 audit[4824]: AVC avc: denied { bpf } for pid=4824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.052000 audit[4824]: AVC avc: denied { bpf } for pid=4824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.052000 audit[4824]: AVC avc: denied { perfmon } for pid=4824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.052000 audit[4824]: AVC avc: denied { perfmon } for pid=4824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.052000 audit[4824]: AVC avc: denied { perfmon } for pid=4824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.052000 audit[4824]: AVC avc: denied { perfmon } for pid=4824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.052000 audit[4824]: AVC avc: denied { perfmon } for pid=4824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.052000 audit[4824]: AVC avc: denied { bpf } for pid=4824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.052000 audit[4824]: AVC avc: denied { bpf } for pid=4824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.052000 audit: BPF prog-id=172 op=LOAD May 17 00:36:08.052000 audit[4824]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000216f08 items=0 ppid=4814 pid=4824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.052000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337363664343635373066623438313536336561303562333634393961 May 17 00:36:08.054000 audit: BPF prog-id=172 op=UNLOAD May 17 00:36:08.054000 audit: BPF prog-id=171 op=UNLOAD May 17 00:36:08.054000 audit[4824]: AVC avc: denied { bpf } for pid=4824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.054000 audit[4824]: AVC avc: denied { bpf } for pid=4824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.054000 audit[4824]: AVC avc: denied { bpf } for pid=4824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.054000 audit[4824]: AVC avc: denied { perfmon } for pid=4824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.054000 audit[4824]: AVC avc: denied { perfmon } for pid=4824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.054000 audit[4824]: AVC avc: denied { perfmon } for pid=4824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.054000 audit[4824]: AVC avc: denied { perfmon } for pid=4824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.054000 audit[4824]: AVC avc: denied { perfmon } for pid=4824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.054000 audit[4824]: AVC avc: denied { bpf } for pid=4824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.054000 audit[4824]: AVC avc: denied { bpf } for pid=4824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.054000 audit: BPF prog-id=173 op=LOAD May 17 00:36:08.054000 audit[4824]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000217318 items=0 ppid=4814 pid=4824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337363664343635373066623438313536336561303562333634393961 May 17 00:36:08.139145 env[1754]: time="2025-05-17T00:36:08.130530773Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-ghjvq,Uid:2a2f6310-2a87-41d3-811a-8205ae62507b,Namespace:kube-system,Attempt:1,} returns sandbox id \"c766d46570fb481563ea05b36499a48da3921feff543d890fce9713e76ff4901\"" May 17 00:36:08.139145 env[1754]: time="2025-05-17T00:36:08.138313004Z" level=info msg="CreateContainer within sandbox \"c766d46570fb481563ea05b36499a48da3921feff543d890fce9713e76ff4901\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 17 00:36:08.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.142000 audit: BPF prog-id=174 op=LOAD May 17 00:36:08.146000 audit[4797]: AVC avc: denied { bpf } for pid=4797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.146000 audit[4797]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4781 pid=4797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832663133626638633935643464333838376134376233333263393733 May 17 00:36:08.146000 audit[4797]: AVC avc: denied { perfmon } for pid=4797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.146000 audit[4797]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=4781 pid=4797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832663133626638633935643464333838376134376233333263393733 May 17 00:36:08.146000 audit[4797]: AVC avc: denied { bpf } for pid=4797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.146000 audit[4797]: AVC avc: denied { bpf } for pid=4797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.146000 audit[4797]: AVC avc: denied { bpf } for pid=4797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.146000 audit[4797]: AVC avc: denied { perfmon } for pid=4797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.146000 audit[4797]: AVC avc: denied { perfmon } for pid=4797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.146000 audit[4797]: AVC avc: denied { perfmon } for pid=4797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.146000 audit[4797]: AVC avc: denied { perfmon } for pid=4797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.146000 audit[4797]: AVC avc: denied { perfmon } for pid=4797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.146000 audit[4797]: AVC avc: denied { bpf } for pid=4797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.146000 audit[4797]: AVC avc: denied { bpf } for pid=4797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.146000 audit: BPF prog-id=175 op=LOAD May 17 00:36:08.146000 audit[4797]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001c72a0 items=0 ppid=4781 pid=4797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832663133626638633935643464333838376134376233333263393733 May 17 00:36:08.147000 audit[4797]: AVC avc: denied { bpf } for pid=4797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.147000 audit[4797]: AVC avc: denied { bpf } for pid=4797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.147000 audit[4797]: AVC avc: denied { perfmon } for pid=4797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.147000 audit[4797]: AVC avc: denied { perfmon } for pid=4797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.147000 audit[4797]: AVC avc: denied { perfmon } for pid=4797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.147000 audit[4797]: AVC avc: denied { perfmon } for pid=4797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.147000 audit[4797]: AVC avc: denied { perfmon } for pid=4797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.147000 audit[4797]: AVC avc: denied { bpf } for pid=4797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.147000 audit[4797]: AVC avc: denied { bpf } for pid=4797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.147000 audit: BPF prog-id=176 op=LOAD May 17 00:36:08.147000 audit[4797]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001c72e8 items=0 ppid=4781 pid=4797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.147000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832663133626638633935643464333838376134376233333263393733 May 17 00:36:08.147000 audit: BPF prog-id=176 op=UNLOAD May 17 00:36:08.147000 audit: BPF prog-id=175 op=UNLOAD May 17 00:36:08.147000 audit[4797]: AVC avc: denied { bpf } for pid=4797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.147000 audit[4797]: AVC avc: denied { bpf } for pid=4797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.147000 audit[4797]: AVC avc: denied { bpf } for pid=4797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.147000 audit[4797]: AVC avc: denied { perfmon } for pid=4797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.147000 audit[4797]: AVC avc: denied { perfmon } for pid=4797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.147000 audit[4797]: AVC avc: denied { perfmon } for pid=4797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.147000 audit[4797]: AVC avc: denied { perfmon } for pid=4797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.147000 audit[4797]: AVC avc: denied { perfmon } for pid=4797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.147000 audit[4797]: AVC avc: denied { bpf } for pid=4797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.147000 audit[4797]: AVC avc: denied { bpf } for pid=4797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.147000 audit: BPF prog-id=177 op=LOAD May 17 00:36:08.147000 audit[4797]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001c76f8 items=0 ppid=4781 pid=4797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.147000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832663133626638633935643464333838376134376233333263393733 May 17 00:36:08.192446 env[1754]: time="2025-05-17T00:36:08.192399485Z" level=info msg="CreateContainer within sandbox \"c766d46570fb481563ea05b36499a48da3921feff543d890fce9713e76ff4901\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"160178003bc017a5d2e46a36141c89c9784b338e5d38844a4da3f42495072ab4\"" May 17 00:36:08.194538 env[1754]: time="2025-05-17T00:36:08.194500664Z" level=info msg="StartContainer for \"160178003bc017a5d2e46a36141c89c9784b338e5d38844a4da3f42495072ab4\"" May 17 00:36:08.208123 env[1754]: time="2025-05-17T00:36:08.208079570Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-z4dbv,Uid:125bc07b-a5e7-420d-bbe5-934e8bac8b88,Namespace:calico-system,Attempt:1,} returns sandbox id \"82f13bf8c95d4d3887a47b332c9736d1000ee88023cae585574a692ec91abd62\"" May 17 00:36:08.239818 systemd[1]: Started cri-containerd-160178003bc017a5d2e46a36141c89c9784b338e5d38844a4da3f42495072ab4.scope. May 17 00:36:08.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.282000 audit: BPF prog-id=178 op=LOAD May 17 00:36:08.283000 audit[4879]: AVC avc: denied { bpf } for pid=4879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.283000 audit[4879]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4814 pid=4879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.283000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136303137383030336263303137613564326534366133363134316338 May 17 00:36:08.284000 audit[4879]: AVC avc: denied { perfmon } for pid=4879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.284000 audit[4879]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4814 pid=4879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136303137383030336263303137613564326534366133363134316338 May 17 00:36:08.284000 audit[4879]: AVC avc: denied { bpf } for pid=4879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.284000 audit[4879]: AVC avc: denied { bpf } for pid=4879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.284000 audit[4879]: AVC avc: denied { bpf } for pid=4879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.284000 audit[4879]: AVC avc: denied { perfmon } for pid=4879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.284000 audit[4879]: AVC avc: denied { perfmon } for pid=4879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.284000 audit[4879]: AVC avc: denied { perfmon } for pid=4879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.284000 audit[4879]: AVC avc: denied { perfmon } for pid=4879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.284000 audit[4879]: AVC avc: denied { perfmon } for pid=4879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.284000 audit[4879]: AVC avc: denied { bpf } for pid=4879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.284000 audit[4879]: AVC avc: denied { bpf } for pid=4879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.284000 audit: BPF prog-id=179 op=LOAD May 17 00:36:08.284000 audit[4879]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000313ee0 items=0 ppid=4814 pid=4879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136303137383030336263303137613564326534366133363134316338 May 17 00:36:08.284000 audit[4879]: AVC avc: denied { bpf } for pid=4879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.284000 audit[4879]: AVC avc: denied { bpf } for pid=4879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.284000 audit[4879]: AVC avc: denied { perfmon } for pid=4879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.284000 audit[4879]: AVC avc: denied { perfmon } for pid=4879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.284000 audit[4879]: AVC avc: denied { perfmon } for pid=4879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.284000 audit[4879]: AVC avc: denied { perfmon } for pid=4879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.284000 audit[4879]: AVC avc: denied { perfmon } for pid=4879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.284000 audit[4879]: AVC avc: denied { bpf } for pid=4879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.284000 audit[4879]: AVC avc: denied { bpf } for pid=4879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.284000 audit: BPF prog-id=180 op=LOAD May 17 00:36:08.284000 audit[4879]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000313f28 items=0 ppid=4814 pid=4879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136303137383030336263303137613564326534366133363134316338 May 17 00:36:08.284000 audit: BPF prog-id=180 op=UNLOAD May 17 00:36:08.284000 audit: BPF prog-id=179 op=UNLOAD May 17 00:36:08.284000 audit[4879]: AVC avc: denied { bpf } for pid=4879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.284000 audit[4879]: AVC avc: denied { bpf } for pid=4879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.284000 audit[4879]: AVC avc: denied { bpf } for pid=4879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.284000 audit[4879]: AVC avc: denied { perfmon } for pid=4879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.284000 audit[4879]: AVC avc: denied { perfmon } for pid=4879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.284000 audit[4879]: AVC avc: denied { perfmon } for pid=4879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.284000 audit[4879]: AVC avc: denied { perfmon } for pid=4879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.284000 audit[4879]: AVC avc: denied { perfmon } for pid=4879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.284000 audit[4879]: AVC avc: denied { bpf } for pid=4879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.284000 audit[4879]: AVC avc: denied { bpf } for pid=4879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.284000 audit: BPF prog-id=181 op=LOAD May 17 00:36:08.284000 audit[4879]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000392338 items=0 ppid=4814 pid=4879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136303137383030336263303137613564326534366133363134316338 May 17 00:36:08.293000 audit[4895]: AVC avc: denied { bpf } for pid=4895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.293000 audit[4895]: AVC avc: denied { bpf } for pid=4895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.293000 audit[4895]: AVC avc: denied { perfmon } for pid=4895 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.293000 audit[4895]: AVC avc: denied { perfmon } for pid=4895 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.293000 audit[4895]: AVC avc: denied { perfmon } for pid=4895 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.293000 audit[4895]: AVC avc: denied { perfmon } for pid=4895 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.293000 audit[4895]: AVC avc: denied { perfmon } for pid=4895 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.293000 audit[4895]: AVC avc: denied { bpf } for pid=4895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.293000 audit[4895]: AVC avc: denied { bpf } for pid=4895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.293000 audit: BPF prog-id=182 op=LOAD May 17 00:36:08.293000 audit[4895]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd9f9e7650 a2=98 a3=1999999999999999 items=0 ppid=4369 pid=4895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.293000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:36:08.293000 audit: BPF prog-id=182 op=UNLOAD May 17 00:36:08.293000 audit[4895]: AVC avc: denied { bpf } for pid=4895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.293000 audit[4895]: AVC avc: denied { bpf } for pid=4895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.293000 audit[4895]: AVC avc: denied { perfmon } for pid=4895 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.293000 audit[4895]: AVC avc: denied { perfmon } for pid=4895 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.293000 audit[4895]: AVC avc: denied { perfmon } for pid=4895 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.293000 audit[4895]: AVC avc: denied { perfmon } for pid=4895 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.293000 audit[4895]: AVC avc: denied { perfmon } for pid=4895 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.293000 audit[4895]: AVC avc: denied { bpf } for pid=4895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.293000 audit[4895]: AVC avc: denied { bpf } for pid=4895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.293000 audit: BPF prog-id=183 op=LOAD May 17 00:36:08.293000 audit[4895]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd9f9e7530 a2=94 a3=ffff items=0 ppid=4369 pid=4895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.293000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:36:08.294000 audit: BPF prog-id=183 op=UNLOAD May 17 00:36:08.294000 audit[4895]: AVC avc: denied { bpf } for pid=4895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.294000 audit[4895]: AVC avc: denied { bpf } for pid=4895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.294000 audit[4895]: AVC avc: denied { perfmon } for pid=4895 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.294000 audit[4895]: AVC avc: denied { perfmon } for pid=4895 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.294000 audit[4895]: AVC avc: denied { perfmon } for pid=4895 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.294000 audit[4895]: AVC avc: denied { perfmon } for pid=4895 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.294000 audit[4895]: AVC avc: denied { perfmon } for pid=4895 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.294000 audit[4895]: AVC avc: denied { bpf } for pid=4895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.294000 audit[4895]: AVC avc: denied { bpf } for pid=4895 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.294000 audit: BPF prog-id=184 op=LOAD May 17 00:36:08.294000 audit[4895]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd9f9e7570 a2=94 a3=7ffd9f9e7750 items=0 ppid=4369 pid=4895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.294000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:36:08.294000 audit: BPF prog-id=184 op=UNLOAD May 17 00:36:08.331834 env[1754]: time="2025-05-17T00:36:08.331778359Z" level=info msg="StartContainer for \"160178003bc017a5d2e46a36141c89c9784b338e5d38844a4da3f42495072ab4\" returns successfully" May 17 00:36:08.336788 systemd-networkd[1462]: calie82f99ea9c5: Gained IPv6LL May 17 00:36:08.397000 audit[4889]: AVC avc: denied { getattr } for pid=4889 comm="coredns" path="cgroup:[4026532720]" dev="nsfs" ino=4026532720 scontext=system_u:system_r:svirt_lxc_net_t:s0:c245,c562 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 17 00:36:08.397000 audit[4889]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00014cb70 a2=c000499ca8 a3=0 items=0 ppid=4814 pid=4889 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c245,c562 key=(null) May 17 00:36:08.397000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 17 00:36:08.524839 systemd-networkd[1462]: vxlan.calico: Link UP May 17 00:36:08.524848 systemd-networkd[1462]: vxlan.calico: Gained carrier May 17 00:36:08.619918 (udev-worker)[4098]: Network interface NamePolicy= disabled on kernel command line. May 17 00:36:08.625000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.625000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.625000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.625000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.625000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.625000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.625000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.625000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.625000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.625000 audit: BPF prog-id=185 op=LOAD May 17 00:36:08.625000 audit[4934]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc8cf01400 a2=98 a3=0 items=0 ppid=4369 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.625000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:08.632000 audit: BPF prog-id=185 op=UNLOAD May 17 00:36:08.657000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.657000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.657000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.657000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.657000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.657000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.657000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.657000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.657000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.657000 audit: BPF prog-id=186 op=LOAD May 17 00:36:08.657000 audit[4934]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc8cf01210 a2=94 a3=54428f items=0 ppid=4369 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.657000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:08.657000 audit: BPF prog-id=186 op=UNLOAD May 17 00:36:08.661000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.661000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.661000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.661000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.661000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.661000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.661000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.661000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.661000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.661000 audit: BPF prog-id=187 op=LOAD May 17 00:36:08.661000 audit[4934]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc8cf01240 a2=94 a3=2 items=0 ppid=4369 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.661000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:08.662000 audit: BPF prog-id=187 op=UNLOAD May 17 00:36:08.662000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.662000 audit[4934]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc8cf01110 a2=28 a3=0 items=0 ppid=4369 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.662000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:08.662000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.662000 audit[4934]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8cf01140 a2=28 a3=0 items=0 ppid=4369 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.662000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:08.662000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.662000 audit[4934]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8cf01050 a2=28 a3=0 items=0 ppid=4369 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.662000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:08.662000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.662000 audit[4934]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc8cf01160 a2=28 a3=0 items=0 ppid=4369 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.662000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:08.662000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.662000 audit[4934]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc8cf01140 a2=28 a3=0 items=0 ppid=4369 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.662000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:08.662000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.662000 audit[4934]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc8cf01130 a2=28 a3=0 items=0 ppid=4369 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.662000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:08.662000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.662000 audit[4934]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc8cf01160 a2=28 a3=0 items=0 ppid=4369 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.662000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:08.662000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.662000 audit[4934]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8cf01140 a2=28 a3=0 items=0 ppid=4369 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.662000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:08.662000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.662000 audit[4934]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8cf01160 a2=28 a3=0 items=0 ppid=4369 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.662000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:08.662000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.662000 audit[4934]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8cf01130 a2=28 a3=0 items=0 ppid=4369 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.662000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:08.662000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.662000 audit[4934]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc8cf011a0 a2=28 a3=0 items=0 ppid=4369 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.662000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:08.662000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.662000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.662000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.662000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.662000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.662000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.662000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.662000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.662000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.662000 audit: BPF prog-id=188 op=LOAD May 17 00:36:08.662000 audit[4934]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc8cf01010 a2=94 a3=0 items=0 ppid=4369 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.662000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:08.662000 audit: BPF prog-id=188 op=UNLOAD May 17 00:36:08.668000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.668000 audit[4934]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffc8cf01000 a2=50 a3=2800 items=0 ppid=4369 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.668000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:08.670000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.670000 audit[4934]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffc8cf01000 a2=50 a3=2800 items=0 ppid=4369 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.670000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:08.670000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.670000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.670000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.670000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.670000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.670000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.670000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.670000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.670000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.670000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.670000 audit: BPF prog-id=189 op=LOAD May 17 00:36:08.670000 audit[4934]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc8cf00820 a2=94 a3=2 items=0 ppid=4369 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.670000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:08.671000 audit: BPF prog-id=189 op=UNLOAD May 17 00:36:08.671000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.671000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.671000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.671000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.671000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.671000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.671000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.671000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.671000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.671000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.671000 audit: BPF prog-id=190 op=LOAD May 17 00:36:08.671000 audit[4934]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc8cf00920 a2=94 a3=30 items=0 ppid=4369 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.671000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:08.689000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.689000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.689000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.689000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.689000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.689000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.689000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.689000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.689000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.689000 audit: BPF prog-id=191 op=LOAD May 17 00:36:08.689000 audit[4938]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff62a5acf0 a2=98 a3=0 items=0 ppid=4369 pid=4938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.689000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:08.691000 audit: BPF prog-id=191 op=UNLOAD May 17 00:36:08.691000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.691000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.691000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.691000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.691000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.691000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.691000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.691000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.691000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.691000 audit: BPF prog-id=192 op=LOAD May 17 00:36:08.691000 audit[4938]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff62a5aae0 a2=94 a3=54428f items=0 ppid=4369 pid=4938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.691000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:08.692000 audit: BPF prog-id=192 op=UNLOAD May 17 00:36:08.692000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.692000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.692000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.692000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.692000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.692000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.692000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.692000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.692000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.692000 audit: BPF prog-id=193 op=LOAD May 17 00:36:08.692000 audit[4938]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff62a5ab10 a2=94 a3=2 items=0 ppid=4369 pid=4938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.692000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:08.692000 audit: BPF prog-id=193 op=UNLOAD May 17 00:36:08.784323 systemd-networkd[1462]: cali2971f166c1c: Gained IPv6LL May 17 00:36:09.003000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.003000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.003000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.003000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.003000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.003000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.003000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.003000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.003000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.003000 audit: BPF prog-id=194 op=LOAD May 17 00:36:09.003000 audit[4938]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff62a5a9d0 a2=94 a3=1 items=0 ppid=4369 pid=4938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:09.015000 audit: BPF prog-id=194 op=UNLOAD May 17 00:36:09.015000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.015000 audit[4938]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff62a5aaa0 a2=50 a3=7fff62a5ab80 items=0 ppid=4369 pid=4938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.015000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:09.050000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.050000 audit[4938]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff62a5a9e0 a2=28 a3=0 items=0 ppid=4369 pid=4938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.050000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:09.051000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.051000 audit[4938]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff62a5aa10 a2=28 a3=0 items=0 ppid=4369 pid=4938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.051000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:09.052000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.052000 audit[4938]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff62a5a920 a2=28 a3=0 items=0 ppid=4369 pid=4938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.052000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:09.052000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.052000 audit[4938]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff62a5aa30 a2=28 a3=0 items=0 ppid=4369 pid=4938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.052000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:09.052000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.052000 audit[4938]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff62a5aa10 a2=28 a3=0 items=0 ppid=4369 pid=4938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.052000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:09.053000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.053000 audit[4938]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff62a5aa00 a2=28 a3=0 items=0 ppid=4369 pid=4938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.053000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:09.053000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.053000 audit[4938]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff62a5aa30 a2=28 a3=0 items=0 ppid=4369 pid=4938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.053000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:09.054000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.054000 audit[4938]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff62a5aa10 a2=28 a3=0 items=0 ppid=4369 pid=4938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.054000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:09.054000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.054000 audit[4938]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff62a5aa30 a2=28 a3=0 items=0 ppid=4369 pid=4938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.054000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:09.054000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.054000 audit[4938]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff62a5aa00 a2=28 a3=0 items=0 ppid=4369 pid=4938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.054000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:09.055000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.055000 audit[4938]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff62a5aa70 a2=28 a3=0 items=0 ppid=4369 pid=4938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.055000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:09.055000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.055000 audit[4938]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff62a5a820 a2=50 a3=1 items=0 ppid=4369 pid=4938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.055000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:09.056000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.056000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.056000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.056000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.056000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.056000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.056000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.056000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.056000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.056000 audit: BPF prog-id=195 op=LOAD May 17 00:36:09.056000 audit[4938]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff62a5a820 a2=94 a3=5 items=0 ppid=4369 pid=4938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.056000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:09.056000 audit: BPF prog-id=195 op=UNLOAD May 17 00:36:09.056000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.056000 audit[4938]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff62a5a8d0 a2=50 a3=1 items=0 ppid=4369 pid=4938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.056000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:09.056000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.056000 audit[4938]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff62a5a9f0 a2=4 a3=38 items=0 ppid=4369 pid=4938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.056000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:09.057000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.057000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.057000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.057000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.057000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.057000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.057000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.057000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.057000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.057000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.057000 audit[4938]: AVC avc: denied { confidentiality } for pid=4938 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:09.057000 audit[4938]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff62a5aa40 a2=94 a3=6 items=0 ppid=4369 pid=4938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.057000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:09.057000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.057000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.057000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.057000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.057000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.057000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.057000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.057000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.057000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.057000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.057000 audit[4938]: AVC avc: denied { confidentiality } for pid=4938 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:09.057000 audit[4938]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff62a5a1f0 a2=94 a3=88 items=0 ppid=4369 pid=4938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.057000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:09.059000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.059000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.059000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.059000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.059000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.059000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.059000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.059000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.059000 audit[4938]: AVC avc: denied { perfmon } for pid=4938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.059000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.059000 audit[4938]: AVC avc: denied { confidentiality } for pid=4938 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:09.059000 audit[4938]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff62a5a1f0 a2=94 a3=88 items=0 ppid=4369 pid=4938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.059000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:09.064000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.064000 audit[4938]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff62a5bc20 a2=10 a3=f8f00800 items=0 ppid=4369 pid=4938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.064000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:09.065000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.065000 audit[4938]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff62a5bac0 a2=10 a3=3 items=0 ppid=4369 pid=4938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.065000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:09.065000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.065000 audit[4938]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff62a5ba60 a2=10 a3=3 items=0 ppid=4369 pid=4938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.065000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:09.065000 audit[4938]: AVC avc: denied { bpf } for pid=4938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.065000 audit[4938]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff62a5ba60 a2=10 a3=7 items=0 ppid=4369 pid=4938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.065000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:09.075000 audit: BPF prog-id=190 op=UNLOAD May 17 00:36:09.168775 systemd-networkd[1462]: cali990a7a2bcf4: Gained IPv6LL May 17 00:36:09.293572 kubelet[2612]: I0517 00:36:09.293410 2612 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7c65d6cfc9-ghjvq" podStartSLOduration=75.293379097 podStartE2EDuration="1m15.293379097s" podCreationTimestamp="2025-05-17 00:34:54 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:36:09.228978082 +0000 UTC m=+79.614870413" watchObservedRunningTime="2025-05-17 00:36:09.293379097 +0000 UTC m=+79.679271427" May 17 00:36:09.307000 audit[4958]: NETFILTER_CFG table=filter:105 family=2 entries=14 op=nft_register_rule pid=4958 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:09.307000 audit[4958]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff5240da30 a2=0 a3=7fff5240da1c items=0 ppid=2984 pid=4958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.307000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:09.338000 audit[4958]: NETFILTER_CFG table=nat:106 family=2 entries=44 op=nft_register_rule pid=4958 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:09.338000 audit[4958]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fff5240da30 a2=0 a3=7fff5240da1c items=0 ppid=2984 pid=4958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.338000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:09.356000 audit[4963]: NETFILTER_CFG table=filter:107 family=2 entries=14 op=nft_register_rule pid=4963 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:09.356000 audit[4963]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff51b839a0 a2=0 a3=7fff51b8398c items=0 ppid=2984 pid=4963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.356000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:09.387000 audit[4963]: NETFILTER_CFG table=nat:108 family=2 entries=56 op=nft_register_chain pid=4963 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:09.387000 audit[4963]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fff51b839a0 a2=0 a3=7fff51b8398c items=0 ppid=2984 pid=4963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.387000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:09.472000 audit[4973]: NETFILTER_CFG table=mangle:109 family=2 entries=16 op=nft_register_chain pid=4973 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:36:09.472000 audit[4973]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffd893be410 a2=0 a3=7ffd893be3fc items=0 ppid=4369 pid=4973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.472000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:36:09.551311 systemd-networkd[1462]: calie0bfbc8ed3f: Gained IPv6LL May 17 00:36:09.564000 audit[4971]: NETFILTER_CFG table=raw:110 family=2 entries=21 op=nft_register_chain pid=4971 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:36:09.564000 audit[4971]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffc04c4e440 a2=0 a3=7ffc04c4e42c items=0 ppid=4369 pid=4971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.564000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:36:09.572000 audit[4974]: NETFILTER_CFG table=nat:111 family=2 entries=15 op=nft_register_chain pid=4974 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:36:09.572000 audit[4974]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd5e303b50 a2=0 a3=7ffd5e303b3c items=0 ppid=4369 pid=4974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.572000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:36:09.576000 audit[4975]: NETFILTER_CFG table=filter:112 family=2 entries=264 op=nft_register_chain pid=4975 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:36:09.576000 audit[4975]: SYSCALL arch=c000003e syscall=46 success=yes exit=154956 a0=3 a1=7ffe5fdf7bb0 a2=0 a3=7ffe5fdf7b9c items=0 ppid=4369 pid=4975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.576000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:36:09.825834 env[1754]: time="2025-05-17T00:36:09.820378225Z" level=info msg="StopPodSandbox for \"eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37\"" May 17 00:36:09.825834 env[1754]: time="2025-05-17T00:36:09.821045755Z" level=info msg="StopPodSandbox for \"7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d\"" May 17 00:36:10.163731 systemd[1]: Started sshd@7-172.31.29.247:22-139.178.68.195:34334.service. May 17 00:36:10.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.29.247:22-139.178.68.195:34334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:10.340172 env[1754]: 2025-05-17 00:36:10.180 [INFO][5009] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37" May 17 00:36:10.340172 env[1754]: 2025-05-17 00:36:10.180 [INFO][5009] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37" iface="eth0" netns="/var/run/netns/cni-cbfd33b0-28d8-501e-f411-89099d95a7be" May 17 00:36:10.340172 env[1754]: 2025-05-17 00:36:10.180 [INFO][5009] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37" iface="eth0" netns="/var/run/netns/cni-cbfd33b0-28d8-501e-f411-89099d95a7be" May 17 00:36:10.340172 env[1754]: 2025-05-17 00:36:10.181 [INFO][5009] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37" iface="eth0" netns="/var/run/netns/cni-cbfd33b0-28d8-501e-f411-89099d95a7be" May 17 00:36:10.340172 env[1754]: 2025-05-17 00:36:10.181 [INFO][5009] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37" May 17 00:36:10.340172 env[1754]: 2025-05-17 00:36:10.181 [INFO][5009] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37" May 17 00:36:10.340172 env[1754]: 2025-05-17 00:36:10.295 [INFO][5026] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37" HandleID="k8s-pod-network.eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37" Workload="ip--172--31--29--247-k8s-calico--apiserver--7fb9df588d--hlgc9-eth0" May 17 00:36:10.340172 env[1754]: 2025-05-17 00:36:10.297 [INFO][5026] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:10.340172 env[1754]: 2025-05-17 00:36:10.297 [INFO][5026] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:10.340172 env[1754]: 2025-05-17 00:36:10.309 [WARNING][5026] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37" HandleID="k8s-pod-network.eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37" Workload="ip--172--31--29--247-k8s-calico--apiserver--7fb9df588d--hlgc9-eth0" May 17 00:36:10.340172 env[1754]: 2025-05-17 00:36:10.320 [INFO][5026] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37" HandleID="k8s-pod-network.eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37" Workload="ip--172--31--29--247-k8s-calico--apiserver--7fb9df588d--hlgc9-eth0" May 17 00:36:10.340172 env[1754]: 2025-05-17 00:36:10.331 [INFO][5026] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:10.340172 env[1754]: 2025-05-17 00:36:10.337 [INFO][5009] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37" May 17 00:36:10.341172 env[1754]: time="2025-05-17T00:36:10.341131812Z" level=info msg="TearDown network for sandbox \"eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37\" successfully" May 17 00:36:10.341298 env[1754]: time="2025-05-17T00:36:10.341277957Z" level=info msg="StopPodSandbox for \"eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37\" returns successfully" May 17 00:36:10.342163 env[1754]: time="2025-05-17T00:36:10.342128859Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7fb9df588d-hlgc9,Uid:a509d34b-b31f-468b-b6a5-303b94e9422a,Namespace:calico-apiserver,Attempt:1,}" May 17 00:36:10.344951 systemd[1]: run-netns-cni\x2dcbfd33b0\x2d28d8\x2d501e\x2df411\x2d89099d95a7be.mount: Deactivated successfully. May 17 00:36:10.364745 env[1754]: 2025-05-17 00:36:10.200 [INFO][5008] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d" May 17 00:36:10.364745 env[1754]: 2025-05-17 00:36:10.208 [INFO][5008] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d" iface="eth0" netns="/var/run/netns/cni-7f98fa83-5878-c4d2-40fa-2fbb772ef734" May 17 00:36:10.364745 env[1754]: 2025-05-17 00:36:10.209 [INFO][5008] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d" iface="eth0" netns="/var/run/netns/cni-7f98fa83-5878-c4d2-40fa-2fbb772ef734" May 17 00:36:10.364745 env[1754]: 2025-05-17 00:36:10.209 [INFO][5008] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d" iface="eth0" netns="/var/run/netns/cni-7f98fa83-5878-c4d2-40fa-2fbb772ef734" May 17 00:36:10.364745 env[1754]: 2025-05-17 00:36:10.209 [INFO][5008] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d" May 17 00:36:10.364745 env[1754]: 2025-05-17 00:36:10.209 [INFO][5008] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d" May 17 00:36:10.364745 env[1754]: 2025-05-17 00:36:10.335 [INFO][5032] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d" HandleID="k8s-pod-network.7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d" Workload="ip--172--31--29--247-k8s-calico--kube--controllers--6cbb479df8--qsnz5-eth0" May 17 00:36:10.364745 env[1754]: 2025-05-17 00:36:10.335 [INFO][5032] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:10.364745 env[1754]: 2025-05-17 00:36:10.335 [INFO][5032] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:10.364745 env[1754]: 2025-05-17 00:36:10.351 [WARNING][5032] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d" HandleID="k8s-pod-network.7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d" Workload="ip--172--31--29--247-k8s-calico--kube--controllers--6cbb479df8--qsnz5-eth0" May 17 00:36:10.364745 env[1754]: 2025-05-17 00:36:10.351 [INFO][5032] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d" HandleID="k8s-pod-network.7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d" Workload="ip--172--31--29--247-k8s-calico--kube--controllers--6cbb479df8--qsnz5-eth0" May 17 00:36:10.364745 env[1754]: 2025-05-17 00:36:10.353 [INFO][5032] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:10.364745 env[1754]: 2025-05-17 00:36:10.358 [INFO][5008] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d" May 17 00:36:10.372320 systemd[1]: run-netns-cni\x2d7f98fa83\x2d5878\x2dc4d2\x2d40fa\x2d2fbb772ef734.mount: Deactivated successfully. May 17 00:36:10.375987 env[1754]: time="2025-05-17T00:36:10.375940063Z" level=info msg="TearDown network for sandbox \"7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d\" successfully" May 17 00:36:10.380867 env[1754]: time="2025-05-17T00:36:10.376102021Z" level=info msg="StopPodSandbox for \"7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d\" returns successfully" May 17 00:36:10.380867 env[1754]: time="2025-05-17T00:36:10.376866172Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6cbb479df8-qsnz5,Uid:df01dd5f-5ff2-409d-b1ac-3ddcb924c138,Namespace:calico-system,Attempt:1,}" May 17 00:36:10.447844 systemd-networkd[1462]: vxlan.calico: Gained IPv6LL May 17 00:36:10.462000 audit[5024]: USER_ACCT pid=5024 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:10.464983 sshd[5024]: Accepted publickey for core from 139.178.68.195 port 34334 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:36:10.464000 audit[5024]: CRED_ACQ pid=5024 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:10.464000 audit[5024]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3c7292d0 a2=3 a3=0 items=0 ppid=1 pid=5024 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:10.464000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:36:10.468574 sshd[5024]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:10.482349 systemd[1]: Started session-8.scope. May 17 00:36:10.483369 systemd-logind[1728]: New session 8 of user core. May 17 00:36:10.491000 audit[5024]: USER_START pid=5024 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:10.493000 audit[5064]: CRED_ACQ pid=5064 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:10.749973 (udev-worker)[4935]: Network interface NamePolicy= disabled on kernel command line. May 17 00:36:10.753825 systemd-networkd[1462]: cali160441618f3: Link UP May 17 00:36:10.757926 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:36:10.758049 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali160441618f3: link becomes ready May 17 00:36:10.758131 systemd-networkd[1462]: cali160441618f3: Gained carrier May 17 00:36:10.816544 env[1754]: 2025-05-17 00:36:10.523 [INFO][5052] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--29--247-k8s-calico--kube--controllers--6cbb479df8--qsnz5-eth0 calico-kube-controllers-6cbb479df8- calico-system df01dd5f-5ff2-409d-b1ac-3ddcb924c138 1042 0 2025-05-17 00:35:41 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:6cbb479df8 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ip-172-31-29-247 calico-kube-controllers-6cbb479df8-qsnz5 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali160441618f3 [] [] }} ContainerID="d1cdc7e749c092b3887699aeb41cacdce0804581de269ca72156ba0d76f9cf11" Namespace="calico-system" Pod="calico-kube-controllers-6cbb479df8-qsnz5" WorkloadEndpoint="ip--172--31--29--247-k8s-calico--kube--controllers--6cbb479df8--qsnz5-" May 17 00:36:10.816544 env[1754]: 2025-05-17 00:36:10.524 [INFO][5052] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="d1cdc7e749c092b3887699aeb41cacdce0804581de269ca72156ba0d76f9cf11" Namespace="calico-system" Pod="calico-kube-controllers-6cbb479df8-qsnz5" WorkloadEndpoint="ip--172--31--29--247-k8s-calico--kube--controllers--6cbb479df8--qsnz5-eth0" May 17 00:36:10.816544 env[1754]: 2025-05-17 00:36:10.637 [INFO][5068] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d1cdc7e749c092b3887699aeb41cacdce0804581de269ca72156ba0d76f9cf11" HandleID="k8s-pod-network.d1cdc7e749c092b3887699aeb41cacdce0804581de269ca72156ba0d76f9cf11" Workload="ip--172--31--29--247-k8s-calico--kube--controllers--6cbb479df8--qsnz5-eth0" May 17 00:36:10.816544 env[1754]: 2025-05-17 00:36:10.638 [INFO][5068] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d1cdc7e749c092b3887699aeb41cacdce0804581de269ca72156ba0d76f9cf11" HandleID="k8s-pod-network.d1cdc7e749c092b3887699aeb41cacdce0804581de269ca72156ba0d76f9cf11" Workload="ip--172--31--29--247-k8s-calico--kube--controllers--6cbb479df8--qsnz5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00032a900), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-29-247", "pod":"calico-kube-controllers-6cbb479df8-qsnz5", "timestamp":"2025-05-17 00:36:10.637773621 +0000 UTC"}, Hostname:"ip-172-31-29-247", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:36:10.816544 env[1754]: 2025-05-17 00:36:10.638 [INFO][5068] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:10.816544 env[1754]: 2025-05-17 00:36:10.638 [INFO][5068] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:10.816544 env[1754]: 2025-05-17 00:36:10.638 [INFO][5068] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-29-247' May 17 00:36:10.816544 env[1754]: 2025-05-17 00:36:10.647 [INFO][5068] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.d1cdc7e749c092b3887699aeb41cacdce0804581de269ca72156ba0d76f9cf11" host="ip-172-31-29-247" May 17 00:36:10.816544 env[1754]: 2025-05-17 00:36:10.653 [INFO][5068] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-29-247" May 17 00:36:10.816544 env[1754]: 2025-05-17 00:36:10.669 [INFO][5068] ipam/ipam.go 511: Trying affinity for 192.168.127.64/26 host="ip-172-31-29-247" May 17 00:36:10.816544 env[1754]: 2025-05-17 00:36:10.681 [INFO][5068] ipam/ipam.go 158: Attempting to load block cidr=192.168.127.64/26 host="ip-172-31-29-247" May 17 00:36:10.816544 env[1754]: 2025-05-17 00:36:10.685 [INFO][5068] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.127.64/26 host="ip-172-31-29-247" May 17 00:36:10.816544 env[1754]: 2025-05-17 00:36:10.686 [INFO][5068] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.127.64/26 handle="k8s-pod-network.d1cdc7e749c092b3887699aeb41cacdce0804581de269ca72156ba0d76f9cf11" host="ip-172-31-29-247" May 17 00:36:10.816544 env[1754]: 2025-05-17 00:36:10.688 [INFO][5068] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.d1cdc7e749c092b3887699aeb41cacdce0804581de269ca72156ba0d76f9cf11 May 17 00:36:10.816544 env[1754]: 2025-05-17 00:36:10.695 [INFO][5068] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.127.64/26 handle="k8s-pod-network.d1cdc7e749c092b3887699aeb41cacdce0804581de269ca72156ba0d76f9cf11" host="ip-172-31-29-247" May 17 00:36:10.816544 env[1754]: 2025-05-17 00:36:10.718 [INFO][5068] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.127.71/26] block=192.168.127.64/26 handle="k8s-pod-network.d1cdc7e749c092b3887699aeb41cacdce0804581de269ca72156ba0d76f9cf11" host="ip-172-31-29-247" May 17 00:36:10.816544 env[1754]: 2025-05-17 00:36:10.718 [INFO][5068] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.127.71/26] handle="k8s-pod-network.d1cdc7e749c092b3887699aeb41cacdce0804581de269ca72156ba0d76f9cf11" host="ip-172-31-29-247" May 17 00:36:10.816544 env[1754]: 2025-05-17 00:36:10.718 [INFO][5068] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:10.816544 env[1754]: 2025-05-17 00:36:10.718 [INFO][5068] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.127.71/26] IPv6=[] ContainerID="d1cdc7e749c092b3887699aeb41cacdce0804581de269ca72156ba0d76f9cf11" HandleID="k8s-pod-network.d1cdc7e749c092b3887699aeb41cacdce0804581de269ca72156ba0d76f9cf11" Workload="ip--172--31--29--247-k8s-calico--kube--controllers--6cbb479df8--qsnz5-eth0" May 17 00:36:10.819730 env[1754]: 2025-05-17 00:36:10.734 [INFO][5052] cni-plugin/k8s.go 418: Populated endpoint ContainerID="d1cdc7e749c092b3887699aeb41cacdce0804581de269ca72156ba0d76f9cf11" Namespace="calico-system" Pod="calico-kube-controllers-6cbb479df8-qsnz5" WorkloadEndpoint="ip--172--31--29--247-k8s-calico--kube--controllers--6cbb479df8--qsnz5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--29--247-k8s-calico--kube--controllers--6cbb479df8--qsnz5-eth0", GenerateName:"calico-kube-controllers-6cbb479df8-", Namespace:"calico-system", SelfLink:"", UID:"df01dd5f-5ff2-409d-b1ac-3ddcb924c138", ResourceVersion:"1042", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6cbb479df8", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-29-247", ContainerID:"", Pod:"calico-kube-controllers-6cbb479df8-qsnz5", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.127.71/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali160441618f3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:10.819730 env[1754]: 2025-05-17 00:36:10.735 [INFO][5052] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.127.71/32] ContainerID="d1cdc7e749c092b3887699aeb41cacdce0804581de269ca72156ba0d76f9cf11" Namespace="calico-system" Pod="calico-kube-controllers-6cbb479df8-qsnz5" WorkloadEndpoint="ip--172--31--29--247-k8s-calico--kube--controllers--6cbb479df8--qsnz5-eth0" May 17 00:36:10.819730 env[1754]: 2025-05-17 00:36:10.735 [INFO][5052] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali160441618f3 ContainerID="d1cdc7e749c092b3887699aeb41cacdce0804581de269ca72156ba0d76f9cf11" Namespace="calico-system" Pod="calico-kube-controllers-6cbb479df8-qsnz5" WorkloadEndpoint="ip--172--31--29--247-k8s-calico--kube--controllers--6cbb479df8--qsnz5-eth0" May 17 00:36:10.819730 env[1754]: 2025-05-17 00:36:10.775 [INFO][5052] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d1cdc7e749c092b3887699aeb41cacdce0804581de269ca72156ba0d76f9cf11" Namespace="calico-system" Pod="calico-kube-controllers-6cbb479df8-qsnz5" WorkloadEndpoint="ip--172--31--29--247-k8s-calico--kube--controllers--6cbb479df8--qsnz5-eth0" May 17 00:36:10.819730 env[1754]: 2025-05-17 00:36:10.780 [INFO][5052] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="d1cdc7e749c092b3887699aeb41cacdce0804581de269ca72156ba0d76f9cf11" Namespace="calico-system" Pod="calico-kube-controllers-6cbb479df8-qsnz5" WorkloadEndpoint="ip--172--31--29--247-k8s-calico--kube--controllers--6cbb479df8--qsnz5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--29--247-k8s-calico--kube--controllers--6cbb479df8--qsnz5-eth0", GenerateName:"calico-kube-controllers-6cbb479df8-", Namespace:"calico-system", SelfLink:"", UID:"df01dd5f-5ff2-409d-b1ac-3ddcb924c138", ResourceVersion:"1042", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6cbb479df8", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-29-247", ContainerID:"d1cdc7e749c092b3887699aeb41cacdce0804581de269ca72156ba0d76f9cf11", Pod:"calico-kube-controllers-6cbb479df8-qsnz5", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.127.71/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali160441618f3", MAC:"7a:60:bd:d1:a4:8d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:10.819730 env[1754]: 2025-05-17 00:36:10.809 [INFO][5052] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="d1cdc7e749c092b3887699aeb41cacdce0804581de269ca72156ba0d76f9cf11" Namespace="calico-system" Pod="calico-kube-controllers-6cbb479df8-qsnz5" WorkloadEndpoint="ip--172--31--29--247-k8s-calico--kube--controllers--6cbb479df8--qsnz5-eth0" May 17 00:36:10.870968 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali135b7ac56fc: link becomes ready May 17 00:36:10.880370 systemd-networkd[1462]: cali135b7ac56fc: Link UP May 17 00:36:10.880613 systemd-networkd[1462]: cali135b7ac56fc: Gained carrier May 17 00:36:10.913087 env[1754]: time="2025-05-17T00:36:10.912977668Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:36:10.913087 env[1754]: time="2025-05-17T00:36:10.913048116Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:36:10.913087 env[1754]: time="2025-05-17T00:36:10.913063241Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:36:10.914585 env[1754]: time="2025-05-17T00:36:10.913819673Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d1cdc7e749c092b3887699aeb41cacdce0804581de269ca72156ba0d76f9cf11 pid=5105 runtime=io.containerd.runc.v2 May 17 00:36:10.924617 env[1754]: 2025-05-17 00:36:10.517 [INFO][5040] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--29--247-k8s-calico--apiserver--7fb9df588d--hlgc9-eth0 calico-apiserver-7fb9df588d- calico-apiserver a509d34b-b31f-468b-b6a5-303b94e9422a 1041 0 2025-05-17 00:35:37 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7fb9df588d projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-29-247 calico-apiserver-7fb9df588d-hlgc9 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali135b7ac56fc [] [] }} ContainerID="e5897dd567d1c7ce3883425bfec2a47f83b3ea46c21cfdf593bf51e097ffd7b4" Namespace="calico-apiserver" Pod="calico-apiserver-7fb9df588d-hlgc9" WorkloadEndpoint="ip--172--31--29--247-k8s-calico--apiserver--7fb9df588d--hlgc9-" May 17 00:36:10.924617 env[1754]: 2025-05-17 00:36:10.517 [INFO][5040] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="e5897dd567d1c7ce3883425bfec2a47f83b3ea46c21cfdf593bf51e097ffd7b4" Namespace="calico-apiserver" Pod="calico-apiserver-7fb9df588d-hlgc9" WorkloadEndpoint="ip--172--31--29--247-k8s-calico--apiserver--7fb9df588d--hlgc9-eth0" May 17 00:36:10.924617 env[1754]: 2025-05-17 00:36:10.652 [INFO][5066] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e5897dd567d1c7ce3883425bfec2a47f83b3ea46c21cfdf593bf51e097ffd7b4" HandleID="k8s-pod-network.e5897dd567d1c7ce3883425bfec2a47f83b3ea46c21cfdf593bf51e097ffd7b4" Workload="ip--172--31--29--247-k8s-calico--apiserver--7fb9df588d--hlgc9-eth0" May 17 00:36:10.924617 env[1754]: 2025-05-17 00:36:10.664 [INFO][5066] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="e5897dd567d1c7ce3883425bfec2a47f83b3ea46c21cfdf593bf51e097ffd7b4" HandleID="k8s-pod-network.e5897dd567d1c7ce3883425bfec2a47f83b3ea46c21cfdf593bf51e097ffd7b4" Workload="ip--172--31--29--247-k8s-calico--apiserver--7fb9df588d--hlgc9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000325f50), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-29-247", "pod":"calico-apiserver-7fb9df588d-hlgc9", "timestamp":"2025-05-17 00:36:10.652373143 +0000 UTC"}, Hostname:"ip-172-31-29-247", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:36:10.924617 env[1754]: 2025-05-17 00:36:10.671 [INFO][5066] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:10.924617 env[1754]: 2025-05-17 00:36:10.718 [INFO][5066] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:10.924617 env[1754]: 2025-05-17 00:36:10.719 [INFO][5066] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-29-247' May 17 00:36:10.924617 env[1754]: 2025-05-17 00:36:10.751 [INFO][5066] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.e5897dd567d1c7ce3883425bfec2a47f83b3ea46c21cfdf593bf51e097ffd7b4" host="ip-172-31-29-247" May 17 00:36:10.924617 env[1754]: 2025-05-17 00:36:10.792 [INFO][5066] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-29-247" May 17 00:36:10.924617 env[1754]: 2025-05-17 00:36:10.811 [INFO][5066] ipam/ipam.go 511: Trying affinity for 192.168.127.64/26 host="ip-172-31-29-247" May 17 00:36:10.924617 env[1754]: 2025-05-17 00:36:10.815 [INFO][5066] ipam/ipam.go 158: Attempting to load block cidr=192.168.127.64/26 host="ip-172-31-29-247" May 17 00:36:10.924617 env[1754]: 2025-05-17 00:36:10.824 [INFO][5066] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.127.64/26 host="ip-172-31-29-247" May 17 00:36:10.924617 env[1754]: 2025-05-17 00:36:10.824 [INFO][5066] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.127.64/26 handle="k8s-pod-network.e5897dd567d1c7ce3883425bfec2a47f83b3ea46c21cfdf593bf51e097ffd7b4" host="ip-172-31-29-247" May 17 00:36:10.924617 env[1754]: 2025-05-17 00:36:10.828 [INFO][5066] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.e5897dd567d1c7ce3883425bfec2a47f83b3ea46c21cfdf593bf51e097ffd7b4 May 17 00:36:10.924617 env[1754]: 2025-05-17 00:36:10.837 [INFO][5066] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.127.64/26 handle="k8s-pod-network.e5897dd567d1c7ce3883425bfec2a47f83b3ea46c21cfdf593bf51e097ffd7b4" host="ip-172-31-29-247" May 17 00:36:10.924617 env[1754]: 2025-05-17 00:36:10.851 [INFO][5066] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.127.72/26] block=192.168.127.64/26 handle="k8s-pod-network.e5897dd567d1c7ce3883425bfec2a47f83b3ea46c21cfdf593bf51e097ffd7b4" host="ip-172-31-29-247" May 17 00:36:10.924617 env[1754]: 2025-05-17 00:36:10.852 [INFO][5066] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.127.72/26] handle="k8s-pod-network.e5897dd567d1c7ce3883425bfec2a47f83b3ea46c21cfdf593bf51e097ffd7b4" host="ip-172-31-29-247" May 17 00:36:10.924617 env[1754]: 2025-05-17 00:36:10.852 [INFO][5066] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:10.924617 env[1754]: 2025-05-17 00:36:10.852 [INFO][5066] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.127.72/26] IPv6=[] ContainerID="e5897dd567d1c7ce3883425bfec2a47f83b3ea46c21cfdf593bf51e097ffd7b4" HandleID="k8s-pod-network.e5897dd567d1c7ce3883425bfec2a47f83b3ea46c21cfdf593bf51e097ffd7b4" Workload="ip--172--31--29--247-k8s-calico--apiserver--7fb9df588d--hlgc9-eth0" May 17 00:36:10.927771 env[1754]: 2025-05-17 00:36:10.864 [INFO][5040] cni-plugin/k8s.go 418: Populated endpoint ContainerID="e5897dd567d1c7ce3883425bfec2a47f83b3ea46c21cfdf593bf51e097ffd7b4" Namespace="calico-apiserver" Pod="calico-apiserver-7fb9df588d-hlgc9" WorkloadEndpoint="ip--172--31--29--247-k8s-calico--apiserver--7fb9df588d--hlgc9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--29--247-k8s-calico--apiserver--7fb9df588d--hlgc9-eth0", GenerateName:"calico-apiserver-7fb9df588d-", Namespace:"calico-apiserver", SelfLink:"", UID:"a509d34b-b31f-468b-b6a5-303b94e9422a", ResourceVersion:"1041", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7fb9df588d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-29-247", ContainerID:"", Pod:"calico-apiserver-7fb9df588d-hlgc9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.127.72/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali135b7ac56fc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:10.927771 env[1754]: 2025-05-17 00:36:10.864 [INFO][5040] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.127.72/32] ContainerID="e5897dd567d1c7ce3883425bfec2a47f83b3ea46c21cfdf593bf51e097ffd7b4" Namespace="calico-apiserver" Pod="calico-apiserver-7fb9df588d-hlgc9" WorkloadEndpoint="ip--172--31--29--247-k8s-calico--apiserver--7fb9df588d--hlgc9-eth0" May 17 00:36:10.927771 env[1754]: 2025-05-17 00:36:10.864 [INFO][5040] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali135b7ac56fc ContainerID="e5897dd567d1c7ce3883425bfec2a47f83b3ea46c21cfdf593bf51e097ffd7b4" Namespace="calico-apiserver" Pod="calico-apiserver-7fb9df588d-hlgc9" WorkloadEndpoint="ip--172--31--29--247-k8s-calico--apiserver--7fb9df588d--hlgc9-eth0" May 17 00:36:10.927771 env[1754]: 2025-05-17 00:36:10.871 [INFO][5040] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e5897dd567d1c7ce3883425bfec2a47f83b3ea46c21cfdf593bf51e097ffd7b4" Namespace="calico-apiserver" Pod="calico-apiserver-7fb9df588d-hlgc9" WorkloadEndpoint="ip--172--31--29--247-k8s-calico--apiserver--7fb9df588d--hlgc9-eth0" May 17 00:36:10.927771 env[1754]: 2025-05-17 00:36:10.898 [INFO][5040] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="e5897dd567d1c7ce3883425bfec2a47f83b3ea46c21cfdf593bf51e097ffd7b4" Namespace="calico-apiserver" Pod="calico-apiserver-7fb9df588d-hlgc9" WorkloadEndpoint="ip--172--31--29--247-k8s-calico--apiserver--7fb9df588d--hlgc9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--29--247-k8s-calico--apiserver--7fb9df588d--hlgc9-eth0", GenerateName:"calico-apiserver-7fb9df588d-", Namespace:"calico-apiserver", SelfLink:"", UID:"a509d34b-b31f-468b-b6a5-303b94e9422a", ResourceVersion:"1041", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7fb9df588d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-29-247", ContainerID:"e5897dd567d1c7ce3883425bfec2a47f83b3ea46c21cfdf593bf51e097ffd7b4", Pod:"calico-apiserver-7fb9df588d-hlgc9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.127.72/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali135b7ac56fc", MAC:"76:fa:14:1a:09:40", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:10.927771 env[1754]: 2025-05-17 00:36:10.921 [INFO][5040] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="e5897dd567d1c7ce3883425bfec2a47f83b3ea46c21cfdf593bf51e097ffd7b4" Namespace="calico-apiserver" Pod="calico-apiserver-7fb9df588d-hlgc9" WorkloadEndpoint="ip--172--31--29--247-k8s-calico--apiserver--7fb9df588d--hlgc9-eth0" May 17 00:36:10.931000 audit[5116]: NETFILTER_CFG table=filter:113 family=2 entries=48 op=nft_register_chain pid=5116 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:36:10.931000 audit[5116]: SYSCALL arch=c000003e syscall=46 success=yes exit=23124 a0=3 a1=7ffed9b84a00 a2=0 a3=7ffed9b849ec items=0 ppid=4369 pid=5116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:10.931000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:36:11.002859 systemd[1]: Started cri-containerd-d1cdc7e749c092b3887699aeb41cacdce0804581de269ca72156ba0d76f9cf11.scope. May 17 00:36:11.024468 env[1754]: time="2025-05-17T00:36:11.001962732Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:36:11.024468 env[1754]: time="2025-05-17T00:36:11.003264032Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:36:11.024468 env[1754]: time="2025-05-17T00:36:11.003284141Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:36:11.024468 env[1754]: time="2025-05-17T00:36:11.003480561Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e5897dd567d1c7ce3883425bfec2a47f83b3ea46c21cfdf593bf51e097ffd7b4 pid=5139 runtime=io.containerd.runc.v2 May 17 00:36:11.053000 audit[5151]: NETFILTER_CFG table=filter:114 family=2 entries=59 op=nft_register_chain pid=5151 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:36:11.053000 audit[5151]: SYSCALL arch=c000003e syscall=46 success=yes exit=29476 a0=3 a1=7fff14426410 a2=0 a3=7fff144263fc items=0 ppid=4369 pid=5151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.053000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:36:11.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.070000 audit: BPF prog-id=196 op=LOAD May 17 00:36:11.074000 audit[5118]: AVC avc: denied { bpf } for pid=5118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.074000 audit[5118]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=5105 pid=5118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431636463376537343963303932623338383736393961656234316361 May 17 00:36:11.075000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.075000 audit[5118]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=5105 pid=5118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431636463376537343963303932623338383736393961656234316361 May 17 00:36:11.075000 audit[5118]: AVC avc: denied { bpf } for pid=5118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.075000 audit[5118]: AVC avc: denied { bpf } for pid=5118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.075000 audit[5118]: AVC avc: denied { bpf } for pid=5118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.075000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.075000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.075000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.075000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.075000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.075000 audit[5118]: AVC avc: denied { bpf } for pid=5118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.075000 audit[5118]: AVC avc: denied { bpf } for pid=5118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.075000 audit: BPF prog-id=197 op=LOAD May 17 00:36:11.075000 audit[5118]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003130e0 items=0 ppid=5105 pid=5118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431636463376537343963303932623338383736393961656234316361 May 17 00:36:11.076000 audit[5118]: AVC avc: denied { bpf } for pid=5118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.076000 audit[5118]: AVC avc: denied { bpf } for pid=5118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.076000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.076000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.076000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.076000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.076000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.076000 audit[5118]: AVC avc: denied { bpf } for pid=5118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.076000 audit[5118]: AVC avc: denied { bpf } for pid=5118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.076000 audit: BPF prog-id=198 op=LOAD May 17 00:36:11.076000 audit[5118]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000313128 items=0 ppid=5105 pid=5118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431636463376537343963303932623338383736393961656234316361 May 17 00:36:11.076000 audit: BPF prog-id=198 op=UNLOAD May 17 00:36:11.076000 audit: BPF prog-id=197 op=UNLOAD May 17 00:36:11.076000 audit[5118]: AVC avc: denied { bpf } for pid=5118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.076000 audit[5118]: AVC avc: denied { bpf } for pid=5118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.076000 audit[5118]: AVC avc: denied { bpf } for pid=5118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.076000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.076000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.076000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.076000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.076000 audit[5118]: AVC avc: denied { perfmon } for pid=5118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.076000 audit[5118]: AVC avc: denied { bpf } for pid=5118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.076000 audit[5118]: AVC avc: denied { bpf } for pid=5118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.076000 audit: BPF prog-id=199 op=LOAD May 17 00:36:11.076000 audit[5118]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000313538 items=0 ppid=5105 pid=5118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431636463376537343963303932623338383736393961656234316361 May 17 00:36:11.082177 systemd[1]: Started cri-containerd-e5897dd567d1c7ce3883425bfec2a47f83b3ea46c21cfdf593bf51e097ffd7b4.scope. May 17 00:36:11.237598 env[1754]: time="2025-05-17T00:36:11.237548601Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6cbb479df8-qsnz5,Uid:df01dd5f-5ff2-409d-b1ac-3ddcb924c138,Namespace:calico-system,Attempt:1,} returns sandbox id \"d1cdc7e749c092b3887699aeb41cacdce0804581de269ca72156ba0d76f9cf11\"" May 17 00:36:11.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.281000 audit: BPF prog-id=200 op=LOAD May 17 00:36:11.281000 audit[5148]: AVC avc: denied { bpf } for pid=5148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.281000 audit[5148]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=5139 pid=5148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535383937646435363764316337636533383833343235626665633261 May 17 00:36:11.282000 audit[5148]: AVC avc: denied { perfmon } for pid=5148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.282000 audit[5148]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=5139 pid=5148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535383937646435363764316337636533383833343235626665633261 May 17 00:36:11.282000 audit[5148]: AVC avc: denied { bpf } for pid=5148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.282000 audit[5148]: AVC avc: denied { bpf } for pid=5148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.282000 audit[5148]: AVC avc: denied { bpf } for pid=5148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.282000 audit[5148]: AVC avc: denied { perfmon } for pid=5148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.282000 audit[5148]: AVC avc: denied { perfmon } for pid=5148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.282000 audit[5148]: AVC avc: denied { perfmon } for pid=5148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.282000 audit[5148]: AVC avc: denied { perfmon } for pid=5148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.282000 audit[5148]: AVC avc: denied { perfmon } for pid=5148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.282000 audit[5148]: AVC avc: denied { bpf } for pid=5148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.282000 audit[5148]: AVC avc: denied { bpf } for pid=5148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.282000 audit: BPF prog-id=201 op=LOAD May 17 00:36:11.282000 audit[5148]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002ddcd0 items=0 ppid=5139 pid=5148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535383937646435363764316337636533383833343235626665633261 May 17 00:36:11.282000 audit[5148]: AVC avc: denied { bpf } for pid=5148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.282000 audit[5148]: AVC avc: denied { bpf } for pid=5148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.282000 audit[5148]: AVC avc: denied { perfmon } for pid=5148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.282000 audit[5148]: AVC avc: denied { perfmon } for pid=5148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.282000 audit[5148]: AVC avc: denied { perfmon } for pid=5148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.282000 audit[5148]: AVC avc: denied { perfmon } for pid=5148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.282000 audit[5148]: AVC avc: denied { perfmon } for pid=5148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.282000 audit[5148]: AVC avc: denied { bpf } for pid=5148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.282000 audit[5148]: AVC avc: denied { bpf } for pid=5148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.282000 audit: BPF prog-id=202 op=LOAD May 17 00:36:11.282000 audit[5148]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002ddd18 items=0 ppid=5139 pid=5148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535383937646435363764316337636533383833343235626665633261 May 17 00:36:11.282000 audit: BPF prog-id=202 op=UNLOAD May 17 00:36:11.282000 audit: BPF prog-id=201 op=UNLOAD May 17 00:36:11.282000 audit[5148]: AVC avc: denied { bpf } for pid=5148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.282000 audit[5148]: AVC avc: denied { bpf } for pid=5148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.282000 audit[5148]: AVC avc: denied { bpf } for pid=5148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.282000 audit[5148]: AVC avc: denied { perfmon } for pid=5148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.282000 audit[5148]: AVC avc: denied { perfmon } for pid=5148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.282000 audit[5148]: AVC avc: denied { perfmon } for pid=5148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.282000 audit[5148]: AVC avc: denied { perfmon } for pid=5148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.282000 audit[5148]: AVC avc: denied { perfmon } for pid=5148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.282000 audit[5148]: AVC avc: denied { bpf } for pid=5148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.282000 audit[5148]: AVC avc: denied { bpf } for pid=5148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.282000 audit: BPF prog-id=203 op=LOAD May 17 00:36:11.282000 audit[5148]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00036a128 items=0 ppid=5139 pid=5148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535383937646435363764316337636533383833343235626665633261 May 17 00:36:11.304155 env[1754]: time="2025-05-17T00:36:11.303912067Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:11.308530 env[1754]: time="2025-05-17T00:36:11.308478661Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:11.311916 env[1754]: time="2025-05-17T00:36:11.311869684Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:11.318618 env[1754]: time="2025-05-17T00:36:11.318138805Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ad7d2e76f15777636c5d91c108d7655659b38fe8970255050ffa51223eb96ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:11.318618 env[1754]: time="2025-05-17T00:36:11.318521589Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\" returns image reference \"sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082\"" May 17 00:36:11.364860 env[1754]: time="2025-05-17T00:36:11.364793385Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7fb9df588d-hlgc9,Uid:a509d34b-b31f-468b-b6a5-303b94e9422a,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"e5897dd567d1c7ce3883425bfec2a47f83b3ea46c21cfdf593bf51e097ffd7b4\"" May 17 00:36:11.401998 env[1754]: time="2025-05-17T00:36:11.401953679Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:36:11.406869 env[1754]: time="2025-05-17T00:36:11.406825238Z" level=info msg="CreateContainer within sandbox \"d5f51fd7ee1ecf3cd020be4822fe0c76e5db0240deabffc12dd59b7fdf843d48\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 17 00:36:11.415205 env[1754]: time="2025-05-17T00:36:11.412598937Z" level=info msg="CreateContainer within sandbox \"e5897dd567d1c7ce3883425bfec2a47f83b3ea46c21cfdf593bf51e097ffd7b4\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 17 00:36:11.449962 env[1754]: time="2025-05-17T00:36:11.449917541Z" level=info msg="CreateContainer within sandbox \"d5f51fd7ee1ecf3cd020be4822fe0c76e5db0240deabffc12dd59b7fdf843d48\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"ffbdd31cf30f18f13185bef58a97c5a3abc6ff3c3762c72751638135940a169b\"" May 17 00:36:11.451603 env[1754]: time="2025-05-17T00:36:11.451575420Z" level=info msg="StartContainer for \"ffbdd31cf30f18f13185bef58a97c5a3abc6ff3c3762c72751638135940a169b\"" May 17 00:36:11.457149 env[1754]: time="2025-05-17T00:36:11.457111095Z" level=info msg="CreateContainer within sandbox \"e5897dd567d1c7ce3883425bfec2a47f83b3ea46c21cfdf593bf51e097ffd7b4\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"ab6add3ba5eed9f8800214f1119a8c965d558186bca5d1b888dacaf4d697294f\"" May 17 00:36:11.458959 env[1754]: time="2025-05-17T00:36:11.458932583Z" level=info msg="StartContainer for \"ab6add3ba5eed9f8800214f1119a8c965d558186bca5d1b888dacaf4d697294f\"" May 17 00:36:11.507223 systemd[1]: Started cri-containerd-ffbdd31cf30f18f13185bef58a97c5a3abc6ff3c3762c72751638135940a169b.scope. May 17 00:36:11.513543 systemd[1]: Started cri-containerd-ab6add3ba5eed9f8800214f1119a8c965d558186bca5d1b888dacaf4d697294f.scope. May 17 00:36:11.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.559000 audit: BPF prog-id=204 op=LOAD May 17 00:36:11.560000 audit[5206]: AVC avc: denied { bpf } for pid=5206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.560000 audit[5206]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4310 pid=5206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.560000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666626464333163663330663138663133313835626566353861393763 May 17 00:36:11.560000 audit[5206]: AVC avc: denied { perfmon } for pid=5206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.560000 audit[5206]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4310 pid=5206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.560000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666626464333163663330663138663133313835626566353861393763 May 17 00:36:11.560000 audit[5206]: AVC avc: denied { bpf } for pid=5206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.560000 audit[5206]: AVC avc: denied { bpf } for pid=5206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.560000 audit[5206]: AVC avc: denied { bpf } for pid=5206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.560000 audit[5206]: AVC avc: denied { perfmon } for pid=5206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.560000 audit[5206]: AVC avc: denied { perfmon } for pid=5206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.560000 audit[5206]: AVC avc: denied { perfmon } for pid=5206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.560000 audit[5206]: AVC avc: denied { perfmon } for pid=5206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.560000 audit[5206]: AVC avc: denied { perfmon } for pid=5206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.560000 audit[5206]: AVC avc: denied { bpf } for pid=5206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.560000 audit[5206]: AVC avc: denied { bpf } for pid=5206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.560000 audit: BPF prog-id=205 op=LOAD May 17 00:36:11.560000 audit[5206]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003be180 items=0 ppid=4310 pid=5206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.560000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666626464333163663330663138663133313835626566353861393763 May 17 00:36:11.561000 audit[5206]: AVC avc: denied { bpf } for pid=5206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.561000 audit[5206]: AVC avc: denied { bpf } for pid=5206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.561000 audit[5206]: AVC avc: denied { perfmon } for pid=5206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.561000 audit[5206]: AVC avc: denied { perfmon } for pid=5206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.561000 audit[5206]: AVC avc: denied { perfmon } for pid=5206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.561000 audit[5206]: AVC avc: denied { perfmon } for pid=5206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.561000 audit[5206]: AVC avc: denied { perfmon } for pid=5206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.561000 audit[5206]: AVC avc: denied { bpf } for pid=5206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.561000 audit[5206]: AVC avc: denied { bpf } for pid=5206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.561000 audit: BPF prog-id=206 op=LOAD May 17 00:36:11.561000 audit[5206]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003be1c8 items=0 ppid=4310 pid=5206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666626464333163663330663138663133313835626566353861393763 May 17 00:36:11.561000 audit: BPF prog-id=206 op=UNLOAD May 17 00:36:11.562000 audit: BPF prog-id=205 op=UNLOAD May 17 00:36:11.562000 audit[5206]: AVC avc: denied { bpf } for pid=5206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.562000 audit[5206]: AVC avc: denied { bpf } for pid=5206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.562000 audit[5206]: AVC avc: denied { bpf } for pid=5206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.562000 audit[5206]: AVC avc: denied { perfmon } for pid=5206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.562000 audit[5206]: AVC avc: denied { perfmon } for pid=5206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.562000 audit[5206]: AVC avc: denied { perfmon } for pid=5206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.562000 audit[5206]: AVC avc: denied { perfmon } for pid=5206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.562000 audit[5206]: AVC avc: denied { perfmon } for pid=5206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.562000 audit[5206]: AVC avc: denied { bpf } for pid=5206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.562000 audit[5206]: AVC avc: denied { bpf } for pid=5206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.562000 audit: BPF prog-id=207 op=LOAD May 17 00:36:11.562000 audit[5206]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003be5d8 items=0 ppid=4310 pid=5206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666626464333163663330663138663133313835626566353861393763 May 17 00:36:11.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.568000 audit: BPF prog-id=208 op=LOAD May 17 00:36:11.569000 audit[5205]: AVC avc: denied { bpf } for pid=5205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.569000 audit[5205]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=5139 pid=5205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.569000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162366164643362613565656439663838303032313466313131396138 May 17 00:36:11.569000 audit[5205]: AVC avc: denied { perfmon } for pid=5205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.569000 audit[5205]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=5139 pid=5205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.569000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162366164643362613565656439663838303032313466313131396138 May 17 00:36:11.570000 audit[5205]: AVC avc: denied { bpf } for pid=5205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.570000 audit[5205]: AVC avc: denied { bpf } for pid=5205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.570000 audit[5205]: AVC avc: denied { bpf } for pid=5205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.570000 audit[5205]: AVC avc: denied { perfmon } for pid=5205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.570000 audit[5205]: AVC avc: denied { perfmon } for pid=5205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.570000 audit[5205]: AVC avc: denied { perfmon } for pid=5205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.570000 audit[5205]: AVC avc: denied { perfmon } for pid=5205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.570000 audit[5205]: AVC avc: denied { perfmon } for pid=5205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.570000 audit[5205]: AVC avc: denied { bpf } for pid=5205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.570000 audit[5205]: AVC avc: denied { bpf } for pid=5205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.570000 audit: BPF prog-id=209 op=LOAD May 17 00:36:11.570000 audit[5205]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000355cf0 items=0 ppid=5139 pid=5205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162366164643362613565656439663838303032313466313131396138 May 17 00:36:11.570000 audit[5205]: AVC avc: denied { bpf } for pid=5205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.570000 audit[5205]: AVC avc: denied { bpf } for pid=5205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.570000 audit[5205]: AVC avc: denied { perfmon } for pid=5205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.570000 audit[5205]: AVC avc: denied { perfmon } for pid=5205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.570000 audit[5205]: AVC avc: denied { perfmon } for pid=5205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.570000 audit[5205]: AVC avc: denied { perfmon } for pid=5205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.570000 audit[5205]: AVC avc: denied { perfmon } for pid=5205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.570000 audit[5205]: AVC avc: denied { bpf } for pid=5205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.570000 audit[5205]: AVC avc: denied { bpf } for pid=5205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.570000 audit: BPF prog-id=210 op=LOAD May 17 00:36:11.570000 audit[5205]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000355d38 items=0 ppid=5139 pid=5205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162366164643362613565656439663838303032313466313131396138 May 17 00:36:11.571000 audit: BPF prog-id=210 op=UNLOAD May 17 00:36:11.571000 audit: BPF prog-id=209 op=UNLOAD May 17 00:36:11.571000 audit[5205]: AVC avc: denied { bpf } for pid=5205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.571000 audit[5205]: AVC avc: denied { bpf } for pid=5205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.571000 audit[5205]: AVC avc: denied { bpf } for pid=5205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.571000 audit[5205]: AVC avc: denied { perfmon } for pid=5205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.571000 audit[5205]: AVC avc: denied { perfmon } for pid=5205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.571000 audit[5205]: AVC avc: denied { perfmon } for pid=5205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.571000 audit[5205]: AVC avc: denied { perfmon } for pid=5205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.571000 audit[5205]: AVC avc: denied { perfmon } for pid=5205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.571000 audit[5205]: AVC avc: denied { bpf } for pid=5205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.571000 audit[5205]: AVC avc: denied { bpf } for pid=5205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.571000 audit: BPF prog-id=211 op=LOAD May 17 00:36:11.571000 audit[5205]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003d0148 items=0 ppid=5139 pid=5205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162366164643362613565656439663838303032313466313131396138 May 17 00:36:11.589114 env[1754]: time="2025-05-17T00:36:11.589064811Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:36:11.591319 env[1754]: time="2025-05-17T00:36:11.591241559Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:36:11.602021 kubelet[2612]: E0517 00:36:11.601960 2612 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:36:11.606509 kubelet[2612]: E0517 00:36:11.606461 2612 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:36:11.607207 env[1754]: time="2025-05-17T00:36:11.607175725Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:36:11.668183 env[1754]: time="2025-05-17T00:36:11.668150003Z" level=info msg="StartContainer for \"ab6add3ba5eed9f8800214f1119a8c965d558186bca5d1b888dacaf4d697294f\" returns successfully" May 17 00:36:11.700781 env[1754]: time="2025-05-17T00:36:11.700676289Z" level=info msg="StartContainer for \"ffbdd31cf30f18f13185bef58a97c5a3abc6ff3c3762c72751638135940a169b\" returns successfully" May 17 00:36:11.716045 kubelet[2612]: E0517 00:36:11.715904 2612 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-h4l9s,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-8f77d7b6c-z92z5_calico-system(b130376b-e592-4257-8150-fa1595d1cccd): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:36:11.726816 kubelet[2612]: E0517 00:36:11.726746 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-8f77d7b6c-z92z5" podUID="b130376b-e592-4257-8150-fa1595d1cccd" May 17 00:36:11.782774 env[1754]: time="2025-05-17T00:36:11.782680066Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:36:11.785357 env[1754]: time="2025-05-17T00:36:11.785293556Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:36:11.785847 kubelet[2612]: E0517 00:36:11.785801 2612 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:36:11.786418 kubelet[2612]: E0517 00:36:11.786032 2612 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:36:11.786559 kubelet[2612]: E0517 00:36:11.786316 2612 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:b6c53c508012409aa85fb49b971c7e57,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-2cfrn,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-6785c57cdd-4bhsp_calico-system(dc702640-bf99-40cf-827b-6579c54fc4b2): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:36:11.789396 env[1754]: time="2025-05-17T00:36:11.789344179Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\"" May 17 00:36:11.871418 sshd[5024]: pam_unix(sshd:session): session closed for user core May 17 00:36:11.876000 audit[5024]: USER_END pid=5024 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:11.876000 audit[5024]: CRED_DISP pid=5024 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:11.889905 systemd-logind[1728]: Session 8 logged out. Waiting for processes to exit. May 17 00:36:11.891000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.29.247:22-139.178.68.195:34334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:11.892033 systemd[1]: sshd@7-172.31.29.247:22-139.178.68.195:34334.service: Deactivated successfully. May 17 00:36:11.893232 systemd[1]: session-8.scope: Deactivated successfully. May 17 00:36:11.895198 systemd-logind[1728]: Removed session 8. May 17 00:36:12.244608 kubelet[2612]: E0517 00:36:12.244561 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\"\"" pod="calico-system/goldmane-8f77d7b6c-z92z5" podUID="b130376b-e592-4257-8150-fa1595d1cccd" May 17 00:36:12.270216 kubelet[2612]: I0517 00:36:12.267204 2612 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7fb9df588d-8ffw4" podStartSLOduration=29.748306918 podStartE2EDuration="35.267167853s" podCreationTimestamp="2025-05-17 00:35:37 +0000 UTC" firstStartedPulling="2025-05-17 00:36:05.857455534 +0000 UTC m=+76.243347856" lastFinishedPulling="2025-05-17 00:36:11.376316471 +0000 UTC m=+81.762208791" observedRunningTime="2025-05-17 00:36:12.265081111 +0000 UTC m=+82.650973445" watchObservedRunningTime="2025-05-17 00:36:12.267167853 +0000 UTC m=+82.653060184" May 17 00:36:12.332481 kubelet[2612]: I0517 00:36:12.332421 2612 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7fb9df588d-hlgc9" podStartSLOduration=35.332394636 podStartE2EDuration="35.332394636s" podCreationTimestamp="2025-05-17 00:35:37 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:36:12.299772775 +0000 UTC m=+82.685665109" watchObservedRunningTime="2025-05-17 00:36:12.332394636 +0000 UTC m=+82.718286994" May 17 00:36:12.357000 audit[5275]: NETFILTER_CFG table=filter:115 family=2 entries=14 op=nft_register_rule pid=5275 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:12.357000 audit[5275]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd284e08e0 a2=0 a3=7ffd284e08cc items=0 ppid=2984 pid=5275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:12.357000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:12.367000 audit[5275]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=5275 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:12.367000 audit[5275]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd284e08e0 a2=0 a3=7ffd284e08cc items=0 ppid=2984 pid=5275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:12.367000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:12.401000 audit[5277]: NETFILTER_CFG table=filter:117 family=2 entries=14 op=nft_register_rule pid=5277 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:12.401000 audit[5277]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffdcee29ab0 a2=0 a3=7ffdcee29a9c items=0 ppid=2984 pid=5277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:12.401000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:12.406000 audit[5277]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=5277 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:12.406000 audit[5277]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffdcee29ab0 a2=0 a3=7ffdcee29a9c items=0 ppid=2984 pid=5277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:12.406000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:12.625852 systemd-networkd[1462]: cali160441618f3: Gained IPv6LL May 17 00:36:12.879326 systemd-networkd[1462]: cali135b7ac56fc: Gained IPv6LL May 17 00:36:13.702401 systemd[1]: run-containerd-runc-k8s.io-2dc05c77b8a15a3750a1c62f783f96ae042785fc5722ed0b801e29addab7327b-runc.m2fYDm.mount: Deactivated successfully. May 17 00:36:14.255522 kubelet[2612]: I0517 00:36:14.254909 2612 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:36:14.314617 kernel: kauditd_printk_skb: 858 callbacks suppressed May 17 00:36:14.316981 kernel: audit: type=1400 audit(1747442174.303:1388): avc: denied { watch } for pid=5231 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_35_52.4205951997/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c449,c996 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c449,c996 tclass=file permissive=0 May 17 00:36:14.319398 kernel: audit: type=1300 audit(1747442174.303:1388): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000b13460 a2=fc6 a3=0 items=0 ppid=5139 pid=5231 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c449,c996 key=(null) May 17 00:36:14.303000 audit[5231]: AVC avc: denied { watch } for pid=5231 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_35_52.4205951997/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c449,c996 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c449,c996 tclass=file permissive=0 May 17 00:36:14.325175 kernel: audit: type=1327 audit(1747442174.303:1388): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:36:14.303000 audit[5231]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000b13460 a2=fc6 a3=0 items=0 ppid=5139 pid=5231 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c449,c996 key=(null) May 17 00:36:14.303000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:36:14.470888 env[1754]: time="2025-05-17T00:36:14.470838605Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:14.475842 env[1754]: time="2025-05-17T00:36:14.475798374Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:14.478387 env[1754]: time="2025-05-17T00:36:14.478266823Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:14.480996 env[1754]: time="2025-05-17T00:36:14.480936708Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:27883a4104876fe239311dd93ce6efd0c4a87de7163d57a4c8d96bd65a287ffd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:14.481770 env[1754]: time="2025-05-17T00:36:14.481696984Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\" returns image reference \"sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e\"" May 17 00:36:14.521443 env[1754]: time="2025-05-17T00:36:14.521326517Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.0\"" May 17 00:36:14.568600 env[1754]: time="2025-05-17T00:36:14.568554765Z" level=info msg="CreateContainer within sandbox \"82f13bf8c95d4d3887a47b332c9736d1000ee88023cae585574a692ec91abd62\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 17 00:36:14.600491 env[1754]: time="2025-05-17T00:36:14.600323254Z" level=info msg="CreateContainer within sandbox \"82f13bf8c95d4d3887a47b332c9736d1000ee88023cae585574a692ec91abd62\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"7276ac7850ab8c8debec6c202394b2b30ede00ed743d9fed88376d6824dde7c9\"" May 17 00:36:14.601521 env[1754]: time="2025-05-17T00:36:14.601482429Z" level=info msg="StartContainer for \"7276ac7850ab8c8debec6c202394b2b30ede00ed743d9fed88376d6824dde7c9\"" May 17 00:36:14.648897 systemd[1]: Started cri-containerd-7276ac7850ab8c8debec6c202394b2b30ede00ed743d9fed88376d6824dde7c9.scope. May 17 00:36:14.687996 systemd[1]: run-containerd-runc-k8s.io-7276ac7850ab8c8debec6c202394b2b30ede00ed743d9fed88376d6824dde7c9-runc.XCwkkM.mount: Deactivated successfully. May 17 00:36:14.736402 kernel: audit: type=1400 audit(1747442174.727:1389): avc: denied { perfmon } for pid=5314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.736543 kernel: audit: type=1300 audit(1747442174.727:1389): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f320c440738 items=0 ppid=4781 pid=5314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:14.727000 audit[5314]: AVC avc: denied { perfmon } for pid=5314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.727000 audit[5314]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f320c440738 items=0 ppid=4781 pid=5314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:14.742610 kernel: audit: type=1327 audit(1747442174.727:1389): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732373661633738353061623863386465626563366332303233393462 May 17 00:36:14.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732373661633738353061623863386465626563366332303233393462 May 17 00:36:14.727000 audit[5314]: AVC avc: denied { bpf } for pid=5314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.749726 kernel: audit: type=1400 audit(1747442174.727:1390): avc: denied { bpf } for pid=5314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.727000 audit[5314]: AVC avc: denied { bpf } for pid=5314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.755740 kernel: audit: type=1400 audit(1747442174.727:1390): avc: denied { bpf } for pid=5314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.727000 audit[5314]: AVC avc: denied { bpf } for pid=5314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.764824 kernel: audit: type=1400 audit(1747442174.727:1390): avc: denied { bpf } for pid=5314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.727000 audit[5314]: AVC avc: denied { perfmon } for pid=5314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.776759 kernel: audit: type=1400 audit(1747442174.727:1390): avc: denied { perfmon } for pid=5314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.782283 env[1754]: time="2025-05-17T00:36:14.782228806Z" level=info msg="StartContainer for \"7276ac7850ab8c8debec6c202394b2b30ede00ed743d9fed88376d6824dde7c9\" returns successfully" May 17 00:36:14.727000 audit[5314]: AVC avc: denied { perfmon } for pid=5314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.727000 audit[5314]: AVC avc: denied { perfmon } for pid=5314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.727000 audit[5314]: AVC avc: denied { perfmon } for pid=5314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.727000 audit[5314]: AVC avc: denied { perfmon } for pid=5314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.727000 audit[5314]: AVC avc: denied { bpf } for pid=5314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.727000 audit[5314]: AVC avc: denied { bpf } for pid=5314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.727000 audit: BPF prog-id=212 op=LOAD May 17 00:36:14.727000 audit[5314]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002b9bd8 items=0 ppid=4781 pid=5314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:14.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732373661633738353061623863386465626563366332303233393462 May 17 00:36:14.736000 audit[5314]: AVC avc: denied { bpf } for pid=5314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.736000 audit[5314]: AVC avc: denied { bpf } for pid=5314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.736000 audit[5314]: AVC avc: denied { perfmon } for pid=5314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.736000 audit[5314]: AVC avc: denied { perfmon } for pid=5314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.736000 audit[5314]: AVC avc: denied { perfmon } for pid=5314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.736000 audit[5314]: AVC avc: denied { perfmon } for pid=5314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.736000 audit[5314]: AVC avc: denied { perfmon } for pid=5314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.736000 audit[5314]: AVC avc: denied { bpf } for pid=5314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.736000 audit[5314]: AVC avc: denied { bpf } for pid=5314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.736000 audit: BPF prog-id=213 op=LOAD May 17 00:36:14.736000 audit[5314]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002b9c28 items=0 ppid=4781 pid=5314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:14.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732373661633738353061623863386465626563366332303233393462 May 17 00:36:14.736000 audit: BPF prog-id=213 op=UNLOAD May 17 00:36:14.736000 audit: BPF prog-id=212 op=UNLOAD May 17 00:36:14.736000 audit[5314]: AVC avc: denied { bpf } for pid=5314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.736000 audit[5314]: AVC avc: denied { bpf } for pid=5314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.736000 audit[5314]: AVC avc: denied { bpf } for pid=5314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.736000 audit[5314]: AVC avc: denied { perfmon } for pid=5314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.736000 audit[5314]: AVC avc: denied { perfmon } for pid=5314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.736000 audit[5314]: AVC avc: denied { perfmon } for pid=5314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.736000 audit[5314]: AVC avc: denied { perfmon } for pid=5314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.736000 audit[5314]: AVC avc: denied { perfmon } for pid=5314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.736000 audit[5314]: AVC avc: denied { bpf } for pid=5314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.736000 audit[5314]: AVC avc: denied { bpf } for pid=5314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.736000 audit: BPF prog-id=214 op=LOAD May 17 00:36:14.736000 audit[5314]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0002b9cb8 items=0 ppid=4781 pid=5314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:14.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732373661633738353061623863386465626563366332303233393462 May 17 00:36:14.763000 audit[5333]: NETFILTER_CFG table=filter:119 family=2 entries=13 op=nft_register_rule pid=5333 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:14.763000 audit[5333]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffce4748300 a2=0 a3=7ffce47482ec items=0 ppid=2984 pid=5333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:14.763000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:14.769000 audit[5333]: NETFILTER_CFG table=nat:120 family=2 entries=27 op=nft_register_chain pid=5333 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:14.769000 audit[5333]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffce4748300 a2=0 a3=7ffce47482ec items=0 ppid=2984 pid=5333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:14.769000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:14.843000 audit[5226]: AVC avc: denied { watch } for pid=5226 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_35_52.491014686/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c793,c813 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c793,c813 tclass=file permissive=0 May 17 00:36:14.843000 audit[5226]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000b68040 a2=fc6 a3=0 items=0 ppid=4310 pid=5226 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c793,c813 key=(null) May 17 00:36:14.843000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:36:14.931000 audit[5346]: NETFILTER_CFG table=filter:121 family=2 entries=12 op=nft_register_rule pid=5346 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:14.931000 audit[5346]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fff1c2fcb80 a2=0 a3=7fff1c2fcb6c items=0 ppid=2984 pid=5346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:14.931000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:14.938000 audit[5346]: NETFILTER_CFG table=nat:122 family=2 entries=34 op=nft_register_chain pid=5346 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:14.938000 audit[5346]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fff1c2fcb80 a2=0 a3=7fff1c2fcb6c items=0 ppid=2984 pid=5346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:14.938000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:16.901233 systemd[1]: Started sshd@8-172.31.29.247:22-139.178.68.195:54482.service. May 17 00:36:16.900000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.29.247:22-139.178.68.195:54482 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:17.190000 audit[5351]: USER_ACCT pid=5351 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:17.192545 sshd[5351]: Accepted publickey for core from 139.178.68.195 port 54482 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:36:17.192000 audit[5351]: CRED_ACQ pid=5351 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:17.192000 audit[5351]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4a0404a0 a2=3 a3=0 items=0 ppid=1 pid=5351 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:17.192000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:36:17.196108 sshd[5351]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:17.227468 systemd[1]: Started session-9.scope. May 17 00:36:17.228497 systemd-logind[1728]: New session 9 of user core. May 17 00:36:17.236000 audit[5351]: USER_START pid=5351 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:17.238000 audit[5353]: CRED_ACQ pid=5353 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:18.101839 env[1754]: time="2025-05-17T00:36:18.101789962Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:18.107219 env[1754]: time="2025-05-17T00:36:18.107183189Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:094053209304a3d20e6561c18d37ac2dc4c7fbb68c1579d9864c303edebffa50,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:18.110027 env[1754]: time="2025-05-17T00:36:18.109985898Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:18.113583 env[1754]: time="2025-05-17T00:36:18.112792967Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:eb5bc5c9e7a71f1d8ea69bbcc8e54b84fb7ec1e32d919c8b148f80b770f20182,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:18.113583 env[1754]: time="2025-05-17T00:36:18.113177110Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.0\" returns image reference \"sha256:094053209304a3d20e6561c18d37ac2dc4c7fbb68c1579d9864c303edebffa50\"" May 17 00:36:18.490761 env[1754]: time="2025-05-17T00:36:18.489995074Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:36:18.660182 env[1754]: time="2025-05-17T00:36:18.660112370Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:36:18.661669 env[1754]: time="2025-05-17T00:36:18.661135849Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:36:18.790564 kubelet[2612]: E0517 00:36:18.778632 2612 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:36:18.836034 kubelet[2612]: E0517 00:36:18.818000 2612 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:36:18.836798 env[1754]: time="2025-05-17T00:36:18.836377188Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\"" May 17 00:36:18.937519 kubelet[2612]: E0517 00:36:18.937447 2612 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-2cfrn,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-6785c57cdd-4bhsp_calico-system(dc702640-bf99-40cf-827b-6579c54fc4b2): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:36:19.000492 kubelet[2612]: E0517 00:36:18.983811 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-6785c57cdd-4bhsp" podUID="dc702640-bf99-40cf-827b-6579c54fc4b2" May 17 00:36:19.100322 env[1754]: time="2025-05-17T00:36:19.098763702Z" level=info msg="CreateContainer within sandbox \"d1cdc7e749c092b3887699aeb41cacdce0804581de269ca72156ba0d76f9cf11\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 17 00:36:19.136040 env[1754]: time="2025-05-17T00:36:19.135987116Z" level=info msg="CreateContainer within sandbox \"d1cdc7e749c092b3887699aeb41cacdce0804581de269ca72156ba0d76f9cf11\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"00db01d84517cc1b88ba86b9061b6f92da3856aacd84d8dfbada5dc2d9547c93\"" May 17 00:36:19.148621 env[1754]: time="2025-05-17T00:36:19.148569817Z" level=info msg="StartContainer for \"00db01d84517cc1b88ba86b9061b6f92da3856aacd84d8dfbada5dc2d9547c93\"" May 17 00:36:19.193462 systemd[1]: Started cri-containerd-00db01d84517cc1b88ba86b9061b6f92da3856aacd84d8dfbada5dc2d9547c93.scope. May 17 00:36:19.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.275000 audit: BPF prog-id=215 op=LOAD May 17 00:36:19.276000 audit[5369]: AVC avc: denied { bpf } for pid=5369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.276000 audit[5369]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=5105 pid=5369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:19.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030646230316438343531376363316238386261383662393036316236 May 17 00:36:19.276000 audit[5369]: AVC avc: denied { perfmon } for pid=5369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.276000 audit[5369]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=5105 pid=5369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:19.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030646230316438343531376363316238386261383662393036316236 May 17 00:36:19.276000 audit[5369]: AVC avc: denied { bpf } for pid=5369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.276000 audit[5369]: AVC avc: denied { bpf } for pid=5369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.276000 audit[5369]: AVC avc: denied { bpf } for pid=5369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.276000 audit[5369]: AVC avc: denied { perfmon } for pid=5369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.276000 audit[5369]: AVC avc: denied { perfmon } for pid=5369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.276000 audit[5369]: AVC avc: denied { perfmon } for pid=5369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.276000 audit[5369]: AVC avc: denied { perfmon } for pid=5369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.276000 audit[5369]: AVC avc: denied { perfmon } for pid=5369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.276000 audit[5369]: AVC avc: denied { bpf } for pid=5369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.276000 audit[5369]: AVC avc: denied { bpf } for pid=5369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.276000 audit: BPF prog-id=216 op=LOAD May 17 00:36:19.276000 audit[5369]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001e3920 items=0 ppid=5105 pid=5369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:19.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030646230316438343531376363316238386261383662393036316236 May 17 00:36:19.276000 audit[5369]: AVC avc: denied { bpf } for pid=5369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.276000 audit[5369]: AVC avc: denied { bpf } for pid=5369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.276000 audit[5369]: AVC avc: denied { perfmon } for pid=5369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.276000 audit[5369]: AVC avc: denied { perfmon } for pid=5369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.276000 audit[5369]: AVC avc: denied { perfmon } for pid=5369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.276000 audit[5369]: AVC avc: denied { perfmon } for pid=5369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.276000 audit[5369]: AVC avc: denied { perfmon } for pid=5369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.276000 audit[5369]: AVC avc: denied { bpf } for pid=5369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.276000 audit[5369]: AVC avc: denied { bpf } for pid=5369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.276000 audit: BPF prog-id=217 op=LOAD May 17 00:36:19.276000 audit[5369]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001e3968 items=0 ppid=5105 pid=5369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:19.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030646230316438343531376363316238386261383662393036316236 May 17 00:36:19.276000 audit: BPF prog-id=217 op=UNLOAD May 17 00:36:19.276000 audit: BPF prog-id=216 op=UNLOAD May 17 00:36:19.276000 audit[5369]: AVC avc: denied { bpf } for pid=5369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.276000 audit[5369]: AVC avc: denied { bpf } for pid=5369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.276000 audit[5369]: AVC avc: denied { bpf } for pid=5369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.276000 audit[5369]: AVC avc: denied { perfmon } for pid=5369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.276000 audit[5369]: AVC avc: denied { perfmon } for pid=5369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.276000 audit[5369]: AVC avc: denied { perfmon } for pid=5369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.276000 audit[5369]: AVC avc: denied { perfmon } for pid=5369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.276000 audit[5369]: AVC avc: denied { perfmon } for pid=5369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.276000 audit[5369]: AVC avc: denied { bpf } for pid=5369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.276000 audit[5369]: AVC avc: denied { bpf } for pid=5369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.276000 audit: BPF prog-id=218 op=LOAD May 17 00:36:19.276000 audit[5369]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001e3d78 items=0 ppid=5105 pid=5369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:19.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030646230316438343531376363316238386261383662393036316236 May 17 00:36:19.336424 env[1754]: time="2025-05-17T00:36:19.336368832Z" level=info msg="StartContainer for \"00db01d84517cc1b88ba86b9061b6f92da3856aacd84d8dfbada5dc2d9547c93\" returns successfully" May 17 00:36:19.894496 sshd[5351]: pam_unix(sshd:session): session closed for user core May 17 00:36:19.907128 kernel: kauditd_printk_skb: 116 callbacks suppressed May 17 00:36:19.909060 kernel: audit: type=1106 audit(1747442179.896:1424): pid=5351 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:19.896000 audit[5351]: USER_END pid=5351 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:19.909306 systemd[1]: sshd@8-172.31.29.247:22-139.178.68.195:54482.service: Deactivated successfully. May 17 00:36:19.910090 systemd[1]: session-9.scope: Deactivated successfully. May 17 00:36:19.910661 systemd-logind[1728]: Session 9 logged out. Waiting for processes to exit. May 17 00:36:19.896000 audit[5351]: CRED_DISP pid=5351 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:19.918739 kernel: audit: type=1104 audit(1747442179.896:1425): pid=5351 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:19.924654 systemd-logind[1728]: Removed session 9. May 17 00:36:19.926195 systemd[1]: Started sshd@9-172.31.29.247:22-139.178.68.195:54498.service. May 17 00:36:19.908000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.29.247:22-139.178.68.195:54482 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:19.937800 kernel: audit: type=1131 audit(1747442179.908:1426): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.29.247:22-139.178.68.195:54482 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:19.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.29.247:22-139.178.68.195:54498 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:19.948748 kernel: audit: type=1130 audit(1747442179.925:1427): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.29.247:22-139.178.68.195:54498 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:19.965594 kubelet[2612]: E0517 00:36:19.965546 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\"\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\"\"]" pod="calico-system/whisker-6785c57cdd-4bhsp" podUID="dc702640-bf99-40cf-827b-6579c54fc4b2" May 17 00:36:20.000928 systemd[1]: run-containerd-runc-k8s.io-00db01d84517cc1b88ba86b9061b6f92da3856aacd84d8dfbada5dc2d9547c93-runc.Ahk2Gj.mount: Deactivated successfully. May 17 00:36:20.109689 kubelet[2612]: I0517 00:36:20.097965 2612 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-6cbb479df8-qsnz5" podStartSLOduration=31.96860103 podStartE2EDuration="39.092036268s" podCreationTimestamp="2025-05-17 00:35:41 +0000 UTC" firstStartedPulling="2025-05-17 00:36:11.272828407 +0000 UTC m=+81.658720729" lastFinishedPulling="2025-05-17 00:36:18.396263647 +0000 UTC m=+88.782155967" observedRunningTime="2025-05-17 00:36:20.089225417 +0000 UTC m=+90.475117749" watchObservedRunningTime="2025-05-17 00:36:20.092036268 +0000 UTC m=+90.477928599" May 17 00:36:20.118000 audit[5412]: NETFILTER_CFG table=filter:123 family=2 entries=12 op=nft_register_rule pid=5412 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:20.124756 kernel: audit: type=1325 audit(1747442180.118:1428): table=filter:123 family=2 entries=12 op=nft_register_rule pid=5412 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:20.118000 audit[5412]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffe1ead5cd0 a2=0 a3=7ffe1ead5cbc items=0 ppid=2984 pid=5412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:20.137829 kernel: audit: type=1300 audit(1747442180.118:1428): arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffe1ead5cd0 a2=0 a3=7ffe1ead5cbc items=0 ppid=2984 pid=5412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:20.145869 kernel: audit: type=1327 audit(1747442180.118:1428): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:20.118000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:20.148000 audit[5412]: NETFILTER_CFG table=nat:124 family=2 entries=22 op=nft_register_rule pid=5412 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:20.166560 kernel: audit: type=1325 audit(1747442180.148:1429): table=nat:124 family=2 entries=22 op=nft_register_rule pid=5412 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:20.166650 kernel: audit: type=1300 audit(1747442180.148:1429): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe1ead5cd0 a2=0 a3=7ffe1ead5cbc items=0 ppid=2984 pid=5412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:20.148000 audit[5412]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe1ead5cd0 a2=0 a3=7ffe1ead5cbc items=0 ppid=2984 pid=5412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:20.148000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:20.175033 kernel: audit: type=1327 audit(1747442180.148:1429): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:20.177094 sshd[5409]: Accepted publickey for core from 139.178.68.195 port 54498 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:36:20.175000 audit[5409]: USER_ACCT pid=5409 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:20.178000 audit[5409]: CRED_ACQ pid=5409 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:20.178000 audit[5409]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff79398650 a2=3 a3=0 items=0 ppid=1 pid=5409 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:20.178000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:36:20.182735 sshd[5409]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:20.196865 systemd[1]: Started session-10.scope. May 17 00:36:20.197900 systemd-logind[1728]: New session 10 of user core. May 17 00:36:20.206000 audit[5409]: USER_START pid=5409 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:20.209000 audit[5413]: CRED_ACQ pid=5413 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:20.920824 systemd[1]: run-containerd-runc-k8s.io-00db01d84517cc1b88ba86b9061b6f92da3856aacd84d8dfbada5dc2d9547c93-runc.FwBb8n.mount: Deactivated successfully. May 17 00:36:21.107259 sshd[5409]: pam_unix(sshd:session): session closed for user core May 17 00:36:21.112000 audit[5409]: USER_END pid=5409 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:21.113000 audit[5409]: CRED_DISP pid=5409 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:21.128209 systemd[1]: Started sshd@10-172.31.29.247:22-139.178.68.195:54512.service. May 17 00:36:21.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.29.247:22-139.178.68.195:54512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:21.133452 systemd[1]: sshd@9-172.31.29.247:22-139.178.68.195:54498.service: Deactivated successfully. May 17 00:36:21.133000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.29.247:22-139.178.68.195:54498 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:21.135592 systemd[1]: session-10.scope: Deactivated successfully. May 17 00:36:21.142244 systemd-logind[1728]: Session 10 logged out. Waiting for processes to exit. May 17 00:36:21.145174 systemd-logind[1728]: Removed session 10. May 17 00:36:21.178485 env[1754]: time="2025-05-17T00:36:21.178366680Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:21.202260 env[1754]: time="2025-05-17T00:36:21.202205971Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:21.206604 env[1754]: time="2025-05-17T00:36:21.206556842Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:21.211938 env[1754]: time="2025-05-17T00:36:21.211889063Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:dca5c16181edde2e860463615523ce457cd9dcfca85b7cfdcd6f3ea7de6f2ac8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:21.213493 env[1754]: time="2025-05-17T00:36:21.212476434Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\" returns image reference \"sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0\"" May 17 00:36:21.235274 env[1754]: time="2025-05-17T00:36:21.235222543Z" level=info msg="CreateContainer within sandbox \"82f13bf8c95d4d3887a47b332c9736d1000ee88023cae585574a692ec91abd62\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 17 00:36:21.273591 env[1754]: time="2025-05-17T00:36:21.273516763Z" level=info msg="CreateContainer within sandbox \"82f13bf8c95d4d3887a47b332c9736d1000ee88023cae585574a692ec91abd62\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"237f4edc4dac3549590d582f1d67dc2bb38f2f70f6e05c4b84a86c4f04b766a3\"" May 17 00:36:21.274507 env[1754]: time="2025-05-17T00:36:21.274474075Z" level=info msg="StartContainer for \"237f4edc4dac3549590d582f1d67dc2bb38f2f70f6e05c4b84a86c4f04b766a3\"" May 17 00:36:21.322152 systemd[1]: Started cri-containerd-237f4edc4dac3549590d582f1d67dc2bb38f2f70f6e05c4b84a86c4f04b766a3.scope. May 17 00:36:21.346000 audit[5451]: AVC avc: denied { perfmon } for pid=5451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:21.346000 audit[5451]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7fb39b781018 items=0 ppid=4781 pid=5451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:21.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233376634656463346461633335343935393064353832663164363764 May 17 00:36:21.347000 audit[5451]: AVC avc: denied { bpf } for pid=5451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:21.347000 audit[5451]: AVC avc: denied { bpf } for pid=5451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:21.347000 audit[5451]: AVC avc: denied { bpf } for pid=5451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:21.347000 audit[5451]: AVC avc: denied { perfmon } for pid=5451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:21.347000 audit[5451]: AVC avc: denied { perfmon } for pid=5451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:21.347000 audit[5451]: AVC avc: denied { perfmon } for pid=5451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:21.347000 audit[5451]: AVC avc: denied { perfmon } for pid=5451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:21.347000 audit[5451]: AVC avc: denied { perfmon } for pid=5451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:21.347000 audit[5451]: AVC avc: denied { bpf } for pid=5451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:21.347000 audit[5451]: AVC avc: denied { bpf } for pid=5451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:21.347000 audit: BPF prog-id=219 op=LOAD May 17 00:36:21.347000 audit[5451]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c0003886f8 items=0 ppid=4781 pid=5451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:21.347000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233376634656463346461633335343935393064353832663164363764 May 17 00:36:21.347000 audit[5451]: AVC avc: denied { bpf } for pid=5451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:21.347000 audit[5451]: AVC avc: denied { bpf } for pid=5451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:21.347000 audit[5451]: AVC avc: denied { perfmon } for pid=5451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:21.347000 audit[5451]: AVC avc: denied { perfmon } for pid=5451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:21.347000 audit[5451]: AVC avc: denied { perfmon } for pid=5451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:21.347000 audit[5451]: AVC avc: denied { perfmon } for pid=5451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:21.347000 audit[5451]: AVC avc: denied { perfmon } for pid=5451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:21.347000 audit[5451]: AVC avc: denied { bpf } for pid=5451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:21.347000 audit[5451]: AVC avc: denied { bpf } for pid=5451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:21.347000 audit: BPF prog-id=220 op=LOAD May 17 00:36:21.347000 audit[5451]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c000388748 items=0 ppid=4781 pid=5451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:21.347000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233376634656463346461633335343935393064353832663164363764 May 17 00:36:21.347000 audit: BPF prog-id=220 op=UNLOAD May 17 00:36:21.347000 audit: BPF prog-id=219 op=UNLOAD May 17 00:36:21.347000 audit[5451]: AVC avc: denied { bpf } for pid=5451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:21.347000 audit[5451]: AVC avc: denied { bpf } for pid=5451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:21.347000 audit[5451]: AVC avc: denied { bpf } for pid=5451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:21.347000 audit[5451]: AVC avc: denied { perfmon } for pid=5451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:21.347000 audit[5451]: AVC avc: denied { perfmon } for pid=5451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:21.347000 audit[5451]: AVC avc: denied { perfmon } for pid=5451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:21.347000 audit[5451]: AVC avc: denied { perfmon } for pid=5451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:21.347000 audit[5451]: AVC avc: denied { perfmon } for pid=5451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:21.347000 audit[5451]: AVC avc: denied { bpf } for pid=5451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:21.347000 audit[5451]: AVC avc: denied { bpf } for pid=5451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:21.347000 audit: BPF prog-id=221 op=LOAD May 17 00:36:21.347000 audit[5451]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c0003887d8 items=0 ppid=4781 pid=5451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:21.347000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233376634656463346461633335343935393064353832663164363764 May 17 00:36:21.364000 audit[5442]: USER_ACCT pid=5442 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:21.365055 sshd[5442]: Accepted publickey for core from 139.178.68.195 port 54512 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:36:21.367000 audit[5442]: CRED_ACQ pid=5442 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:21.367000 audit[5442]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2a6a3a40 a2=3 a3=0 items=0 ppid=1 pid=5442 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:21.367000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:36:21.370118 sshd[5442]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:21.378059 systemd[1]: Started session-11.scope. May 17 00:36:21.380064 systemd-logind[1728]: New session 11 of user core. May 17 00:36:21.388000 audit[5442]: USER_START pid=5442 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:21.390000 audit[5477]: CRED_ACQ pid=5477 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:21.397776 env[1754]: time="2025-05-17T00:36:21.397694714Z" level=info msg="StartContainer for \"237f4edc4dac3549590d582f1d67dc2bb38f2f70f6e05c4b84a86c4f04b766a3\" returns successfully" May 17 00:36:21.645227 sshd[5442]: pam_unix(sshd:session): session closed for user core May 17 00:36:21.651000 audit[5442]: USER_END pid=5442 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:21.652000 audit[5442]: CRED_DISP pid=5442 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:21.654716 systemd[1]: sshd@10-172.31.29.247:22-139.178.68.195:54512.service: Deactivated successfully. May 17 00:36:21.655900 systemd[1]: session-11.scope: Deactivated successfully. May 17 00:36:21.654000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.29.247:22-139.178.68.195:54512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:21.657142 systemd-logind[1728]: Session 11 logged out. Waiting for processes to exit. May 17 00:36:21.658181 systemd-logind[1728]: Removed session 11. May 17 00:36:21.841137 kubelet[2612]: I0517 00:36:21.841086 2612 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-z4dbv" podStartSLOduration=27.846997817 podStartE2EDuration="40.841061792s" podCreationTimestamp="2025-05-17 00:35:41 +0000 UTC" firstStartedPulling="2025-05-17 00:36:08.222547568 +0000 UTC m=+78.608439881" lastFinishedPulling="2025-05-17 00:36:21.216611535 +0000 UTC m=+91.602503856" observedRunningTime="2025-05-17 00:36:21.84022404 +0000 UTC m=+92.226116370" watchObservedRunningTime="2025-05-17 00:36:21.841061792 +0000 UTC m=+92.226954118" May 17 00:36:22.112729 kubelet[2612]: I0517 00:36:22.108946 2612 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 17 00:36:22.112729 kubelet[2612]: I0517 00:36:22.112643 2612 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 17 00:36:22.718858 systemd[1]: run-containerd-runc-k8s.io-00db01d84517cc1b88ba86b9061b6f92da3856aacd84d8dfbada5dc2d9547c93-runc.aPjqJ6.mount: Deactivated successfully. May 17 00:36:22.820845 env[1754]: time="2025-05-17T00:36:22.820788786Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:36:22.975825 env[1754]: time="2025-05-17T00:36:22.975527962Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:36:22.977968 env[1754]: time="2025-05-17T00:36:22.977909047Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:36:22.978280 kubelet[2612]: E0517 00:36:22.978221 2612 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:36:22.979481 kubelet[2612]: E0517 00:36:22.978295 2612 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:36:22.981847 kubelet[2612]: E0517 00:36:22.981758 2612 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-h4l9s,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-8f77d7b6c-z92z5_calico-system(b130376b-e592-4257-8150-fa1595d1cccd): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:36:22.983240 kubelet[2612]: E0517 00:36:22.983192 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-8f77d7b6c-z92z5" podUID="b130376b-e592-4257-8150-fa1595d1cccd" May 17 00:36:26.670598 systemd[1]: Started sshd@11-172.31.29.247:22-139.178.68.195:55244.service. May 17 00:36:26.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.29.247:22-139.178.68.195:55244 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:26.672610 kernel: kauditd_printk_skb: 64 callbacks suppressed May 17 00:36:26.673722 kernel: audit: type=1130 audit(1747442186.670:1453): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.29.247:22-139.178.68.195:55244 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:26.929000 audit[5509]: USER_ACCT pid=5509 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:26.937669 sshd[5509]: Accepted publickey for core from 139.178.68.195 port 55244 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:36:26.938009 kernel: audit: type=1101 audit(1747442186.929:1454): pid=5509 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:26.937000 audit[5509]: CRED_ACQ pid=5509 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:26.941526 sshd[5509]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:26.944799 kernel: audit: type=1103 audit(1747442186.937:1455): pid=5509 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:26.945643 kernel: audit: type=1006 audit(1747442186.937:1456): pid=5509 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 May 17 00:36:26.948854 kernel: audit: type=1300 audit(1747442186.937:1456): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcdac6a4f0 a2=3 a3=0 items=0 ppid=1 pid=5509 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:26.937000 audit[5509]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcdac6a4f0 a2=3 a3=0 items=0 ppid=1 pid=5509 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:26.958485 kernel: audit: type=1327 audit(1747442186.937:1456): proctitle=737368643A20636F7265205B707269765D May 17 00:36:26.937000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:36:26.963577 systemd-logind[1728]: New session 12 of user core. May 17 00:36:26.964156 systemd[1]: Started session-12.scope. May 17 00:36:26.974000 audit[5509]: USER_START pid=5509 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:26.975000 audit[5511]: CRED_ACQ pid=5511 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:26.989190 kernel: audit: type=1105 audit(1747442186.974:1457): pid=5509 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:26.989915 kernel: audit: type=1103 audit(1747442186.975:1458): pid=5511 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:27.590428 sshd[5509]: pam_unix(sshd:session): session closed for user core May 17 00:36:27.600901 kernel: audit: type=1106 audit(1747442187.592:1459): pid=5509 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:27.592000 audit[5509]: USER_END pid=5509 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:27.592000 audit[5509]: CRED_DISP pid=5509 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:27.608730 kernel: audit: type=1104 audit(1747442187.592:1460): pid=5509 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:27.611457 systemd[1]: sshd@11-172.31.29.247:22-139.178.68.195:55244.service: Deactivated successfully. May 17 00:36:27.610000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.29.247:22-139.178.68.195:55244 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:27.612310 systemd[1]: session-12.scope: Deactivated successfully. May 17 00:36:27.613050 systemd-logind[1728]: Session 12 logged out. Waiting for processes to exit. May 17 00:36:27.613913 systemd-logind[1728]: Removed session 12. May 17 00:36:30.827521 env[1754]: time="2025-05-17T00:36:30.827480049Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:36:31.065319 env[1754]: time="2025-05-17T00:36:31.065242366Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:36:31.067509 env[1754]: time="2025-05-17T00:36:31.067425755Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:36:31.068001 kubelet[2612]: E0517 00:36:31.067945 2612 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:36:31.068417 kubelet[2612]: E0517 00:36:31.068005 2612 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:36:31.081075 kubelet[2612]: E0517 00:36:31.068156 2612 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:b6c53c508012409aa85fb49b971c7e57,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-2cfrn,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-6785c57cdd-4bhsp_calico-system(dc702640-bf99-40cf-827b-6579c54fc4b2): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:36:31.084511 env[1754]: time="2025-05-17T00:36:31.084203150Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:36:31.254253 env[1754]: time="2025-05-17T00:36:31.254193424Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:36:31.256422 env[1754]: time="2025-05-17T00:36:31.256357069Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:36:31.256690 kubelet[2612]: E0517 00:36:31.256625 2612 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:36:31.256690 kubelet[2612]: E0517 00:36:31.256689 2612 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:36:31.256911 kubelet[2612]: E0517 00:36:31.256859 2612 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-2cfrn,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-6785c57cdd-4bhsp_calico-system(dc702640-bf99-40cf-827b-6579c54fc4b2): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:36:31.261686 kubelet[2612]: E0517 00:36:31.261623 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-6785c57cdd-4bhsp" podUID="dc702640-bf99-40cf-827b-6579c54fc4b2" May 17 00:36:32.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.29.247:22-139.178.68.195:55252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:32.618064 systemd[1]: Started sshd@12-172.31.29.247:22-139.178.68.195:55252.service. May 17 00:36:32.619811 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:36:32.620050 kernel: audit: type=1130 audit(1747442192.617:1462): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.29.247:22-139.178.68.195:55252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:32.876000 audit[5536]: USER_ACCT pid=5536 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:32.879558 sshd[5536]: Accepted publickey for core from 139.178.68.195 port 55252 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:36:32.885000 audit[5536]: CRED_ACQ pid=5536 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:32.892676 sshd[5536]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:32.893916 kernel: audit: type=1101 audit(1747442192.876:1463): pid=5536 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:32.895480 kernel: audit: type=1103 audit(1747442192.885:1464): pid=5536 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:32.895662 kernel: audit: type=1006 audit(1747442192.885:1465): pid=5536 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 May 17 00:36:32.885000 audit[5536]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc179f8920 a2=3 a3=0 items=0 ppid=1 pid=5536 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:32.905277 systemd[1]: Started session-13.scope. May 17 00:36:32.907126 kernel: audit: type=1300 audit(1747442192.885:1465): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc179f8920 a2=3 a3=0 items=0 ppid=1 pid=5536 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:32.906282 systemd-logind[1728]: New session 13 of user core. May 17 00:36:32.885000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:36:32.911072 kernel: audit: type=1327 audit(1747442192.885:1465): proctitle=737368643A20636F7265205B707269765D May 17 00:36:32.914000 audit[5536]: USER_START pid=5536 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:32.917000 audit[5538]: CRED_ACQ pid=5538 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:32.930308 kernel: audit: type=1105 audit(1747442192.914:1466): pid=5536 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:32.930441 kernel: audit: type=1103 audit(1747442192.917:1467): pid=5538 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:33.591047 sshd[5536]: pam_unix(sshd:session): session closed for user core May 17 00:36:33.591000 audit[5536]: USER_END pid=5536 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:33.594963 systemd[1]: sshd@12-172.31.29.247:22-139.178.68.195:55252.service: Deactivated successfully. May 17 00:36:33.595787 systemd[1]: session-13.scope: Deactivated successfully. May 17 00:36:33.597352 systemd-logind[1728]: Session 13 logged out. Waiting for processes to exit. May 17 00:36:33.598949 systemd-logind[1728]: Removed session 13. May 17 00:36:33.591000 audit[5536]: CRED_DISP pid=5536 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:33.606752 kernel: audit: type=1106 audit(1747442193.591:1468): pid=5536 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:33.606930 kernel: audit: type=1104 audit(1747442193.591:1469): pid=5536 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:33.591000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.29.247:22-139.178.68.195:55252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:35.819554 kubelet[2612]: E0517 00:36:35.819517 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\"\"" pod="calico-system/goldmane-8f77d7b6c-z92z5" podUID="b130376b-e592-4257-8150-fa1595d1cccd" May 17 00:36:38.616197 systemd[1]: Started sshd@13-172.31.29.247:22-139.178.68.195:46412.service. May 17 00:36:38.618624 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:36:38.618806 kernel: audit: type=1130 audit(1747442198.615:1471): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.29.247:22-139.178.68.195:46412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:38.615000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.29.247:22-139.178.68.195:46412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:38.781000 audit[5553]: USER_ACCT pid=5553 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:38.784481 sshd[5553]: Accepted publickey for core from 139.178.68.195 port 46412 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:36:38.791781 kernel: audit: type=1101 audit(1747442198.781:1472): pid=5553 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:38.790000 audit[5553]: CRED_ACQ pid=5553 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:38.792337 sshd[5553]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:38.804151 kernel: audit: type=1103 audit(1747442198.790:1473): pid=5553 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:38.804350 kernel: audit: type=1006 audit(1747442198.790:1474): pid=5553 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 May 17 00:36:38.790000 audit[5553]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe181f5ac0 a2=3 a3=0 items=0 ppid=1 pid=5553 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:38.790000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:36:38.814627 systemd-logind[1728]: New session 14 of user core. May 17 00:36:38.815696 systemd[1]: Started session-14.scope. May 17 00:36:38.817753 kernel: audit: type=1300 audit(1747442198.790:1474): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe181f5ac0 a2=3 a3=0 items=0 ppid=1 pid=5553 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:38.817843 kernel: audit: type=1327 audit(1747442198.790:1474): proctitle=737368643A20636F7265205B707269765D May 17 00:36:38.825000 audit[5553]: USER_START pid=5553 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:38.834734 kernel: audit: type=1105 audit(1747442198.825:1475): pid=5553 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:38.825000 audit[5555]: CRED_ACQ pid=5555 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:38.841840 kernel: audit: type=1103 audit(1747442198.825:1476): pid=5555 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:39.154806 sshd[5553]: pam_unix(sshd:session): session closed for user core May 17 00:36:39.156000 audit[5553]: USER_END pid=5553 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:39.166058 kernel: audit: type=1106 audit(1747442199.156:1477): pid=5553 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:39.170940 kernel: audit: type=1104 audit(1747442199.165:1478): pid=5553 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:39.165000 audit[5553]: CRED_DISP pid=5553 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:39.169586 systemd[1]: sshd@13-172.31.29.247:22-139.178.68.195:46412.service: Deactivated successfully. May 17 00:36:39.171872 systemd[1]: session-14.scope: Deactivated successfully. May 17 00:36:39.172996 systemd-logind[1728]: Session 14 logged out. Waiting for processes to exit. May 17 00:36:39.169000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.29.247:22-139.178.68.195:46412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:39.174408 systemd-logind[1728]: Removed session 14. May 17 00:36:41.716000 audit[2468]: AVC avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:41.716000 audit[2468]: AVC avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:41.716000 audit[2468]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00351cae0 a2=fc6 a3=0 items=0 ppid=2314 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 key=(null) May 17 00:36:41.716000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:36:41.716000 audit[2468]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00316ffb0 a2=fc6 a3=0 items=0 ppid=2314 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 key=(null) May 17 00:36:41.716000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:36:44.186373 systemd[1]: Started sshd@14-172.31.29.247:22-139.178.68.195:58944.service. May 17 00:36:44.195410 kernel: kauditd_printk_skb: 7 callbacks suppressed May 17 00:36:44.195507 kernel: audit: type=1130 audit(1747442204.185:1482): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.29.247:22-139.178.68.195:58944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:44.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.29.247:22-139.178.68.195:58944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:44.464000 audit[5585]: USER_ACCT pid=5585 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:44.475859 kernel: audit: type=1101 audit(1747442204.464:1483): pid=5585 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:44.473000 audit[5585]: CRED_ACQ pid=5585 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:44.477131 sshd[5585]: Accepted publickey for core from 139.178.68.195 port 58944 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:36:44.483114 sshd[5585]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:44.488141 kernel: audit: type=1103 audit(1747442204.473:1484): pid=5585 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:44.488278 kernel: audit: type=1006 audit(1747442204.473:1485): pid=5585 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 17 00:36:44.473000 audit[5585]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5859c210 a2=3 a3=0 items=0 ppid=1 pid=5585 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:44.497894 kernel: audit: type=1300 audit(1747442204.473:1485): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5859c210 a2=3 a3=0 items=0 ppid=1 pid=5585 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:44.473000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:36:44.501849 kernel: audit: type=1327 audit(1747442204.473:1485): proctitle=737368643A20636F7265205B707269765D May 17 00:36:44.505952 systemd-logind[1728]: New session 15 of user core. May 17 00:36:44.506557 systemd[1]: Started session-15.scope. May 17 00:36:44.511000 audit[5585]: USER_START pid=5585 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:44.515000 audit[5587]: CRED_ACQ pid=5587 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:44.527075 kernel: audit: type=1105 audit(1747442204.511:1486): pid=5585 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:44.527192 kernel: audit: type=1103 audit(1747442204.515:1487): pid=5587 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:45.250000 audit[2477]: AVC avc: denied { watch } for pid=2477 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c831,c866 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:45.273943 kernel: audit: type=1400 audit(1747442205.250:1488): avc: denied { watch } for pid=2477 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c831,c866 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:45.274068 kernel: audit: type=1300 audit(1747442205.250:1488): arch=c000003e syscall=254 success=no exit=-13 a0=80 a1=c004e204e0 a2=fc6 a3=0 items=0 ppid=2305 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c831,c866 key=(null) May 17 00:36:45.250000 audit[2477]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=80 a1=c004e204e0 a2=fc6 a3=0 items=0 ppid=2305 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c831,c866 key=(null) May 17 00:36:45.250000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32392E323437002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:36:45.250000 audit[2477]: AVC avc: denied { watch } for pid=2477 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c831,c866 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:45.250000 audit[2477]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=81 a1=c006b54270 a2=fc6 a3=0 items=0 ppid=2305 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c831,c866 key=(null) May 17 00:36:45.250000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32392E323437002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:36:45.272000 audit[2477]: AVC avc: denied { watch } for pid=2477 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c831,c866 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:45.272000 audit[2477]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=82 a1=c004e20510 a2=fc6 a3=0 items=0 ppid=2305 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c831,c866 key=(null) May 17 00:36:45.272000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32392E323437002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:36:45.282000 audit[2477]: AVC avc: denied { watch } for pid=2477 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c831,c866 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:45.282000 audit[2477]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=80 a1=c0074d9ee0 a2=fc6 a3=0 items=0 ppid=2305 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c831,c866 key=(null) May 17 00:36:45.282000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32392E323437002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:36:45.380000 audit[2477]: AVC avc: denied { watch } for pid=2477 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c831,c866 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:45.380000 audit[2477]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=81 a1=c004e21260 a2=fc6 a3=0 items=0 ppid=2305 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c831,c866 key=(null) May 17 00:36:45.380000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32392E323437002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:36:45.381000 audit[2477]: AVC avc: denied { watch } for pid=2477 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c831,c866 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:45.381000 audit[2477]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=81 a1=c0057521e0 a2=fc6 a3=0 items=0 ppid=2305 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c831,c866 key=(null) May 17 00:36:45.381000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32392E323437002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 17 00:36:45.411653 sshd[5585]: pam_unix(sshd:session): session closed for user core May 17 00:36:45.413000 audit[5585]: USER_END pid=5585 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:45.413000 audit[5585]: CRED_DISP pid=5585 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:45.416000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.29.247:22-139.178.68.195:58944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:45.416804 systemd-logind[1728]: Session 15 logged out. Waiting for processes to exit. May 17 00:36:45.417200 systemd[1]: sshd@14-172.31.29.247:22-139.178.68.195:58944.service: Deactivated successfully. May 17 00:36:45.418275 systemd[1]: session-15.scope: Deactivated successfully. May 17 00:36:45.419474 systemd-logind[1728]: Removed session 15. May 17 00:36:45.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.29.247:22-139.178.68.195:58950 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:45.437159 systemd[1]: Started sshd@15-172.31.29.247:22-139.178.68.195:58950.service. May 17 00:36:45.609000 audit[5597]: USER_ACCT pid=5597 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:45.610975 sshd[5597]: Accepted publickey for core from 139.178.68.195 port 58950 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:36:45.611000 audit[5597]: CRED_ACQ pid=5597 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:45.611000 audit[5597]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8fc8e190 a2=3 a3=0 items=0 ppid=1 pid=5597 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:45.611000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:36:45.613063 sshd[5597]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:45.618551 systemd-logind[1728]: New session 16 of user core. May 17 00:36:45.619248 systemd[1]: Started session-16.scope. May 17 00:36:45.624000 audit[5597]: USER_START pid=5597 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:45.626000 audit[5599]: CRED_ACQ pid=5599 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:45.924259 kubelet[2612]: E0517 00:36:45.924194 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\"\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\"\"]" pod="calico-system/whisker-6785c57cdd-4bhsp" podUID="dc702640-bf99-40cf-827b-6579c54fc4b2" May 17 00:36:46.398859 sshd[5597]: pam_unix(sshd:session): session closed for user core May 17 00:36:46.399000 audit[5597]: USER_END pid=5597 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:46.401000 audit[5597]: CRED_DISP pid=5597 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:46.403692 systemd[1]: sshd@15-172.31.29.247:22-139.178.68.195:58950.service: Deactivated successfully. May 17 00:36:46.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.29.247:22-139.178.68.195:58950 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:46.404502 systemd[1]: session-16.scope: Deactivated successfully. May 17 00:36:46.405288 systemd-logind[1728]: Session 16 logged out. Waiting for processes to exit. May 17 00:36:46.406170 systemd-logind[1728]: Removed session 16. May 17 00:36:46.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.29.247:22-139.178.68.195:58952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:46.422111 systemd[1]: Started sshd@16-172.31.29.247:22-139.178.68.195:58952.service. May 17 00:36:46.590000 audit[5606]: USER_ACCT pid=5606 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:46.591939 sshd[5606]: Accepted publickey for core from 139.178.68.195 port 58952 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:36:46.592000 audit[5606]: CRED_ACQ pid=5606 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:46.592000 audit[5606]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff713e1ad0 a2=3 a3=0 items=0 ppid=1 pid=5606 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:46.592000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:36:46.593805 sshd[5606]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:46.599300 systemd[1]: Started session-17.scope. May 17 00:36:46.599669 systemd-logind[1728]: New session 17 of user core. May 17 00:36:46.605000 audit[5606]: USER_START pid=5606 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:46.607000 audit[5608]: CRED_ACQ pid=5608 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:49.077760 env[1754]: time="2025-05-17T00:36:49.077696604Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:36:49.279819 env[1754]: time="2025-05-17T00:36:49.279605441Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:36:49.284501 env[1754]: time="2025-05-17T00:36:49.284360632Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:36:49.449063 kubelet[2612]: E0517 00:36:49.445465 2612 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:36:49.548258 kubelet[2612]: E0517 00:36:49.548197 2612 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:36:49.669303 kubelet[2612]: E0517 00:36:49.669220 2612 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-h4l9s,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-8f77d7b6c-z92z5_calico-system(b130376b-e592-4257-8150-fa1595d1cccd): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:36:49.764588 kubelet[2612]: E0517 00:36:49.764453 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-8f77d7b6c-z92z5" podUID="b130376b-e592-4257-8150-fa1595d1cccd" May 17 00:36:51.255000 audit[5627]: NETFILTER_CFG table=filter:125 family=2 entries=24 op=nft_register_rule pid=5627 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:51.537197 kernel: kauditd_printk_skb: 38 callbacks suppressed May 17 00:36:51.546483 kernel: audit: type=1325 audit(1747442211.255:1512): table=filter:125 family=2 entries=24 op=nft_register_rule pid=5627 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:51.550218 kernel: audit: type=1300 audit(1747442211.255:1512): arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffddd707fc0 a2=0 a3=7ffddd707fac items=0 ppid=2984 pid=5627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:51.553439 kernel: audit: type=1327 audit(1747442211.255:1512): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:51.553522 kernel: audit: type=1325 audit(1747442211.273:1513): table=nat:126 family=2 entries=22 op=nft_register_rule pid=5627 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:51.553552 kernel: audit: type=1300 audit(1747442211.273:1513): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffddd707fc0 a2=0 a3=0 items=0 ppid=2984 pid=5627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:51.553578 kernel: audit: type=1327 audit(1747442211.273:1513): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:51.553597 kernel: audit: type=1325 audit(1747442211.315:1514): table=filter:127 family=2 entries=36 op=nft_register_rule pid=5630 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:51.560606 kernel: audit: type=1300 audit(1747442211.315:1514): arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffed62f2410 a2=0 a3=7ffed62f23fc items=0 ppid=2984 pid=5630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:51.560725 kernel: audit: type=1327 audit(1747442211.315:1514): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:51.560766 kernel: audit: type=1325 audit(1747442211.332:1515): table=nat:128 family=2 entries=22 op=nft_register_rule pid=5630 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:51.255000 audit[5627]: SYSCALL arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffddd707fc0 a2=0 a3=7ffddd707fac items=0 ppid=2984 pid=5627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:51.255000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:51.273000 audit[5627]: NETFILTER_CFG table=nat:126 family=2 entries=22 op=nft_register_rule pid=5627 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:51.273000 audit[5627]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffddd707fc0 a2=0 a3=0 items=0 ppid=2984 pid=5627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:51.273000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:51.315000 audit[5630]: NETFILTER_CFG table=filter:127 family=2 entries=36 op=nft_register_rule pid=5630 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:51.315000 audit[5630]: SYSCALL arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffed62f2410 a2=0 a3=7ffed62f23fc items=0 ppid=2984 pid=5630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:51.315000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:51.332000 audit[5630]: NETFILTER_CFG table=nat:128 family=2 entries=22 op=nft_register_rule pid=5630 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:51.332000 audit[5630]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffed62f2410 a2=0 a3=0 items=0 ppid=2984 pid=5630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:51.332000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:52.020476 sshd[5606]: pam_unix(sshd:session): session closed for user core May 17 00:36:52.210000 audit[5606]: USER_END pid=5606 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:52.216000 audit[5606]: CRED_DISP pid=5606 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:52.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.29.247:22-139.178.68.195:58958 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:52.229769 systemd[1]: Started sshd@17-172.31.29.247:22-139.178.68.195:58958.service. May 17 00:36:52.252117 systemd[1]: sshd@16-172.31.29.247:22-139.178.68.195:58952.service: Deactivated successfully. May 17 00:36:52.255000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.29.247:22-139.178.68.195:58952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:52.262362 systemd[1]: session-17.scope: Deactivated successfully. May 17 00:36:52.264435 systemd-logind[1728]: Session 17 logged out. Waiting for processes to exit. May 17 00:36:52.270453 systemd-logind[1728]: Removed session 17. May 17 00:36:52.545000 audit[5633]: USER_ACCT pid=5633 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:52.547008 sshd[5633]: Accepted publickey for core from 139.178.68.195 port 58958 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:36:52.547000 audit[5633]: CRED_ACQ pid=5633 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:52.547000 audit[5633]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8032ddc0 a2=3 a3=0 items=0 ppid=1 pid=5633 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:52.547000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:36:52.552998 sshd[5633]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:52.625843 systemd[1]: Started session-18.scope. May 17 00:36:52.627032 systemd-logind[1728]: New session 18 of user core. May 17 00:36:52.639000 audit[5633]: USER_START pid=5633 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:52.641000 audit[5636]: CRED_ACQ pid=5636 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:36:52.790000 audit[2468]: AVC avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:52.790000 audit[2468]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=c0030e4400 a2=fc6 a3=0 items=0 ppid=2314 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 key=(null) May 17 00:36:52.790000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:36:52.790000 audit[2468]: AVC avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:52.790000 audit[2468]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0031e90e0 a2=fc6 a3=0 items=0 ppid=2314 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 key=(null) May 17 00:36:52.790000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:36:52.821000 audit[2468]: AVC avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:52.821000 audit[2468]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0030e4420 a2=fc6 a3=0 items=0 ppid=2314 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 key=(null) May 17 00:36:52.821000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:36:52.823000 audit[2468]: AVC avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:52.823000 audit[2468]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0031e9a40 a2=fc6 a3=0 items=0 ppid=2314 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 key=(null) May 17 00:36:52.823000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:36:55.378494 systemd[1]: run-containerd-runc-k8s.io-00db01d84517cc1b88ba86b9061b6f92da3856aacd84d8dfbada5dc2d9547c93-runc.a8jqn4.mount: Deactivated successfully. May 17 00:36:56.560183 env[1754]: time="2025-05-17T00:36:56.559633736Z" level=info msg="StopPodSandbox for \"eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37\"" May 17 00:36:57.880908 env[1754]: 2025-05-17 00:36:57.328 [WARNING][5688] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--29--247-k8s-calico--apiserver--7fb9df588d--hlgc9-eth0", GenerateName:"calico-apiserver-7fb9df588d-", Namespace:"calico-apiserver", SelfLink:"", UID:"a509d34b-b31f-468b-b6a5-303b94e9422a", ResourceVersion:"1099", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7fb9df588d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-29-247", ContainerID:"e5897dd567d1c7ce3883425bfec2a47f83b3ea46c21cfdf593bf51e097ffd7b4", Pod:"calico-apiserver-7fb9df588d-hlgc9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.127.72/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali135b7ac56fc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:57.880908 env[1754]: 2025-05-17 00:36:57.338 [INFO][5688] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37" May 17 00:36:57.880908 env[1754]: 2025-05-17 00:36:57.338 [INFO][5688] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37" iface="eth0" netns="" May 17 00:36:57.880908 env[1754]: 2025-05-17 00:36:57.338 [INFO][5688] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37" May 17 00:36:57.880908 env[1754]: 2025-05-17 00:36:57.338 [INFO][5688] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37" May 17 00:36:57.880908 env[1754]: 2025-05-17 00:36:57.838 [INFO][5695] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37" HandleID="k8s-pod-network.eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37" Workload="ip--172--31--29--247-k8s-calico--apiserver--7fb9df588d--hlgc9-eth0" May 17 00:36:57.880908 env[1754]: 2025-05-17 00:36:57.842 [INFO][5695] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:57.880908 env[1754]: 2025-05-17 00:36:57.842 [INFO][5695] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:57.880908 env[1754]: 2025-05-17 00:36:57.868 [WARNING][5695] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37" HandleID="k8s-pod-network.eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37" Workload="ip--172--31--29--247-k8s-calico--apiserver--7fb9df588d--hlgc9-eth0" May 17 00:36:57.880908 env[1754]: 2025-05-17 00:36:57.868 [INFO][5695] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37" HandleID="k8s-pod-network.eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37" Workload="ip--172--31--29--247-k8s-calico--apiserver--7fb9df588d--hlgc9-eth0" May 17 00:36:57.880908 env[1754]: 2025-05-17 00:36:57.871 [INFO][5695] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:57.880908 env[1754]: 2025-05-17 00:36:57.874 [INFO][5688] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37" May 17 00:36:57.880908 env[1754]: time="2025-05-17T00:36:57.881119455Z" level=info msg="TearDown network for sandbox \"eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37\" successfully" May 17 00:36:57.880908 env[1754]: time="2025-05-17T00:36:57.881161867Z" level=info msg="StopPodSandbox for \"eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37\" returns successfully" May 17 00:36:59.810766 kernel: kauditd_printk_skb: 25 callbacks suppressed May 17 00:36:59.850908 kernel: audit: type=1325 audit(1747442219.806:1529): table=filter:129 family=2 entries=24 op=nft_register_rule pid=5705 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:59.852132 kernel: audit: type=1300 audit(1747442219.806:1529): arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffd753b56e0 a2=0 a3=7ffd753b56cc items=0 ppid=2984 pid=5705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:59.852221 kernel: audit: type=1327 audit(1747442219.806:1529): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:59.806000 audit[5705]: NETFILTER_CFG table=filter:129 family=2 entries=24 op=nft_register_rule pid=5705 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:59.886167 kernel: audit: type=1325 audit(1747442219.857:1530): table=nat:130 family=2 entries=106 op=nft_register_chain pid=5705 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:59.886305 kernel: audit: type=1300 audit(1747442219.857:1530): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffd753b56e0 a2=0 a3=7ffd753b56cc items=0 ppid=2984 pid=5705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:59.886375 kernel: audit: type=1327 audit(1747442219.857:1530): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:59.806000 audit[5705]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffd753b56e0 a2=0 a3=7ffd753b56cc items=0 ppid=2984 pid=5705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:59.806000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:59.857000 audit[5705]: NETFILTER_CFG table=nat:130 family=2 entries=106 op=nft_register_chain pid=5705 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:59.857000 audit[5705]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffd753b56e0 a2=0 a3=7ffd753b56cc items=0 ppid=2984 pid=5705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:59.857000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:05.928683 sshd[5633]: pam_unix(sshd:session): session closed for user core May 17 00:37:06.048289 kernel: audit: type=1106 audit(1747442226.011:1531): pid=5633 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:06.050338 kernel: audit: type=1104 audit(1747442226.016:1532): pid=5633 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:06.050441 kernel: audit: type=1130 audit(1747442226.033:1533): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.29.247:22-139.178.68.195:39244 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:06.011000 audit[5633]: USER_END pid=5633 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:06.016000 audit[5633]: CRED_DISP pid=5633 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:06.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.29.247:22-139.178.68.195:39244 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:06.034000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.29.247:22-139.178.68.195:58958 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:06.033668 systemd[1]: Started sshd@18-172.31.29.247:22-139.178.68.195:39244.service. May 17 00:37:06.065744 kernel: audit: type=1131 audit(1747442226.034:1534): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.29.247:22-139.178.68.195:58958 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:06.034600 systemd[1]: sshd@17-172.31.29.247:22-139.178.68.195:58958.service: Deactivated successfully. May 17 00:37:06.035803 systemd[1]: session-18.scope: Deactivated successfully. May 17 00:37:06.035959 systemd[1]: session-18.scope: Consumed 2.685s CPU time. May 17 00:37:06.040511 systemd-logind[1728]: Session 18 logged out. Waiting for processes to exit. May 17 00:37:06.042680 systemd-logind[1728]: Removed session 18. May 17 00:37:06.282000 audit[5710]: USER_ACCT pid=5710 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:06.291866 sshd[5710]: Accepted publickey for core from 139.178.68.195 port 39244 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:37:06.294881 kernel: audit: type=1101 audit(1747442226.282:1535): pid=5710 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:06.294970 kernel: audit: type=1103 audit(1747442226.291:1536): pid=5710 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:06.291000 audit[5710]: CRED_ACQ pid=5710 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:06.296553 sshd[5710]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:37:06.307731 kernel: audit: type=1006 audit(1747442226.291:1537): pid=5710 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 May 17 00:37:06.291000 audit[5710]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffccea91880 a2=3 a3=0 items=0 ppid=1 pid=5710 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:06.329909 kernel: audit: type=1300 audit(1747442226.291:1537): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffccea91880 a2=3 a3=0 items=0 ppid=1 pid=5710 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:06.330020 kernel: audit: type=1327 audit(1747442226.291:1537): proctitle=737368643A20636F7265205B707269765D May 17 00:37:06.291000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:37:06.348850 systemd[1]: Started session-19.scope. May 17 00:37:06.351378 systemd-logind[1728]: New session 19 of user core. May 17 00:37:06.359000 audit[5710]: USER_START pid=5710 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:06.369809 kernel: audit: type=1105 audit(1747442226.359:1538): pid=5710 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:06.362000 audit[5713]: CRED_ACQ pid=5713 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:07.049657 env[1754]: time="2025-05-17T00:37:07.049609046Z" level=info msg="RemovePodSandbox for \"eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37\"" May 17 00:37:07.053541 env[1754]: time="2025-05-17T00:37:07.049662211Z" level=info msg="Forcibly stopping sandbox \"eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37\"" May 17 00:37:08.369291 env[1754]: 2025-05-17 00:37:07.672 [WARNING][5729] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--29--247-k8s-calico--apiserver--7fb9df588d--hlgc9-eth0", GenerateName:"calico-apiserver-7fb9df588d-", Namespace:"calico-apiserver", SelfLink:"", UID:"a509d34b-b31f-468b-b6a5-303b94e9422a", ResourceVersion:"1099", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7fb9df588d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-29-247", ContainerID:"e5897dd567d1c7ce3883425bfec2a47f83b3ea46c21cfdf593bf51e097ffd7b4", Pod:"calico-apiserver-7fb9df588d-hlgc9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.127.72/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali135b7ac56fc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:08.369291 env[1754]: 2025-05-17 00:37:07.685 [INFO][5729] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37" May 17 00:37:08.369291 env[1754]: 2025-05-17 00:37:07.685 [INFO][5729] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37" iface="eth0" netns="" May 17 00:37:08.369291 env[1754]: 2025-05-17 00:37:07.685 [INFO][5729] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37" May 17 00:37:08.369291 env[1754]: 2025-05-17 00:37:07.685 [INFO][5729] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37" May 17 00:37:08.369291 env[1754]: 2025-05-17 00:37:08.289 [INFO][5736] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37" HandleID="k8s-pod-network.eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37" Workload="ip--172--31--29--247-k8s-calico--apiserver--7fb9df588d--hlgc9-eth0" May 17 00:37:08.369291 env[1754]: 2025-05-17 00:37:08.300 [INFO][5736] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:08.369291 env[1754]: 2025-05-17 00:37:08.302 [INFO][5736] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:08.369291 env[1754]: 2025-05-17 00:37:08.343 [WARNING][5736] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37" HandleID="k8s-pod-network.eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37" Workload="ip--172--31--29--247-k8s-calico--apiserver--7fb9df588d--hlgc9-eth0" May 17 00:37:08.369291 env[1754]: 2025-05-17 00:37:08.343 [INFO][5736] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37" HandleID="k8s-pod-network.eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37" Workload="ip--172--31--29--247-k8s-calico--apiserver--7fb9df588d--hlgc9-eth0" May 17 00:37:08.369291 env[1754]: 2025-05-17 00:37:08.346 [INFO][5736] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:08.369291 env[1754]: 2025-05-17 00:37:08.354 [INFO][5729] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37" May 17 00:37:08.369291 env[1754]: time="2025-05-17T00:37:08.362733341Z" level=info msg="TearDown network for sandbox \"eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37\" successfully" May 17 00:37:08.432727 env[1754]: time="2025-05-17T00:37:08.383259648Z" level=info msg="RemovePodSandbox \"eb0d96fc45f5136c52fd9aebb6226a24afd14535b7b8cd5cde43f5575a529b37\" returns successfully" May 17 00:37:09.261228 amazon-ssm-agent[1716]: 2025-05-17 00:37:09 INFO [HealthCheck] HealthCheck reporting agent health. May 17 00:37:10.449542 kubelet[2612]: E0517 00:37:08.458870 2612 kubelet.go:2512] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="17.488s" May 17 00:37:12.657471 sshd[5710]: pam_unix(sshd:session): session closed for user core May 17 00:37:12.719143 env[1754]: time="2025-05-17T00:37:12.690648398Z" level=info msg="StopPodSandbox for \"68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a\"" May 17 00:37:12.748476 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:37:12.749394 kernel: audit: type=1106 audit(1747442232.726:1540): pid=5710 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:12.726000 audit[5710]: USER_END pid=5710 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:12.728000 audit[5710]: CRED_DISP pid=5710 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:12.749594 systemd[1]: sshd@18-172.31.29.247:22-139.178.68.195:39244.service: Deactivated successfully. May 17 00:37:12.765877 kernel: audit: type=1104 audit(1747442232.728:1541): pid=5710 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:12.767286 systemd[1]: session-19.scope: Deactivated successfully. May 17 00:37:12.767483 systemd[1]: session-19.scope: Consumed 1.509s CPU time. May 17 00:37:12.777249 kernel: audit: type=1131 audit(1747442232.761:1542): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.29.247:22-139.178.68.195:39244 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:12.761000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.29.247:22-139.178.68.195:39244 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:12.780488 systemd-logind[1728]: Session 19 logged out. Waiting for processes to exit. May 17 00:37:12.790178 systemd-logind[1728]: Removed session 19. May 17 00:37:12.842171 kubelet[2612]: E0517 00:37:12.819351 2612 kubelet.go:2512] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="1.605s" May 17 00:37:12.853284 kubelet[2612]: E0517 00:37:12.853243 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\"\"" pod="calico-system/goldmane-8f77d7b6c-z92z5" podUID="b130376b-e592-4257-8150-fa1595d1cccd" May 17 00:37:12.899003 env[1754]: time="2025-05-17T00:37:12.898737157Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:37:13.100998 env[1754]: time="2025-05-17T00:37:13.100320520Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:37:13.102689 env[1754]: time="2025-05-17T00:37:13.102598557Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:37:13.105631 kubelet[2612]: E0517 00:37:13.105479 2612 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:37:13.108843 kubelet[2612]: E0517 00:37:13.108783 2612 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:37:13.119987 kubelet[2612]: E0517 00:37:13.119919 2612 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:b6c53c508012409aa85fb49b971c7e57,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-2cfrn,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-6785c57cdd-4bhsp_calico-system(dc702640-bf99-40cf-827b-6579c54fc4b2): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:37:13.130871 env[1754]: time="2025-05-17T00:37:13.122760362Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:37:13.445148 env[1754]: time="2025-05-17T00:37:13.445078894Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:37:13.447272 env[1754]: time="2025-05-17T00:37:13.447211453Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:37:13.448126 kubelet[2612]: E0517 00:37:13.447789 2612 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:37:13.448126 kubelet[2612]: E0517 00:37:13.447869 2612 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:37:13.449246 kubelet[2612]: E0517 00:37:13.448217 2612 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-2cfrn,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-6785c57cdd-4bhsp_calico-system(dc702640-bf99-40cf-827b-6579c54fc4b2): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:37:13.449956 kubelet[2612]: E0517 00:37:13.449406 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-6785c57cdd-4bhsp" podUID="dc702640-bf99-40cf-827b-6579c54fc4b2" May 17 00:37:13.934267 env[1754]: 2025-05-17 00:37:13.378 [WARNING][5754] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--29--247-k8s-goldmane--8f77d7b6c--z92z5-eth0", GenerateName:"goldmane-8f77d7b6c-", Namespace:"calico-system", SelfLink:"", UID:"b130376b-e592-4257-8150-fa1595d1cccd", ResourceVersion:"1428", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"8f77d7b6c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-29-247", ContainerID:"a229e853cf7c26f450ea2e75d492ccfe1300818319c9e458f0e40bc65c1e3a68", Pod:"goldmane-8f77d7b6c-z92z5", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.127.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calie82f99ea9c5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:13.934267 env[1754]: 2025-05-17 00:37:13.383 [INFO][5754] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a" May 17 00:37:13.934267 env[1754]: 2025-05-17 00:37:13.383 [INFO][5754] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a" iface="eth0" netns="" May 17 00:37:13.934267 env[1754]: 2025-05-17 00:37:13.383 [INFO][5754] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a" May 17 00:37:13.934267 env[1754]: 2025-05-17 00:37:13.383 [INFO][5754] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a" May 17 00:37:13.934267 env[1754]: 2025-05-17 00:37:13.876 [INFO][5761] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a" HandleID="k8s-pod-network.68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a" Workload="ip--172--31--29--247-k8s-goldmane--8f77d7b6c--z92z5-eth0" May 17 00:37:13.934267 env[1754]: 2025-05-17 00:37:13.883 [INFO][5761] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:13.934267 env[1754]: 2025-05-17 00:37:13.886 [INFO][5761] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:13.934267 env[1754]: 2025-05-17 00:37:13.918 [WARNING][5761] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a" HandleID="k8s-pod-network.68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a" Workload="ip--172--31--29--247-k8s-goldmane--8f77d7b6c--z92z5-eth0" May 17 00:37:13.934267 env[1754]: 2025-05-17 00:37:13.919 [INFO][5761] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a" HandleID="k8s-pod-network.68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a" Workload="ip--172--31--29--247-k8s-goldmane--8f77d7b6c--z92z5-eth0" May 17 00:37:13.934267 env[1754]: 2025-05-17 00:37:13.920 [INFO][5761] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:13.934267 env[1754]: 2025-05-17 00:37:13.929 [INFO][5754] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a" May 17 00:37:13.939046 env[1754]: time="2025-05-17T00:37:13.935328128Z" level=info msg="TearDown network for sandbox \"68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a\" successfully" May 17 00:37:13.939046 env[1754]: time="2025-05-17T00:37:13.935394952Z" level=info msg="StopPodSandbox for \"68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a\" returns successfully" May 17 00:37:13.939944 env[1754]: time="2025-05-17T00:37:13.939542565Z" level=info msg="RemovePodSandbox for \"68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a\"" May 17 00:37:13.939944 env[1754]: time="2025-05-17T00:37:13.939579765Z" level=info msg="Forcibly stopping sandbox \"68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a\"" May 17 00:37:14.375000 audit[5231]: AVC avc: denied { watch } for pid=5231 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_35_52.4205951997/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c449,c996 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c449,c996 tclass=file permissive=0 May 17 00:37:14.510959 kernel: audit: type=1400 audit(1747442234.375:1543): avc: denied { watch } for pid=5231 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_35_52.4205951997/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c449,c996 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c449,c996 tclass=file permissive=0 May 17 00:37:14.542572 kernel: audit: type=1300 audit(1747442234.375:1543): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000f09140 a2=fc6 a3=0 items=0 ppid=5139 pid=5231 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c449,c996 key=(null) May 17 00:37:14.551438 kernel: audit: type=1327 audit(1747442234.375:1543): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:37:14.375000 audit[5231]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000f09140 a2=fc6 a3=0 items=0 ppid=5139 pid=5231 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c449,c996 key=(null) May 17 00:37:14.375000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:37:14.851000 audit[5226]: AVC avc: denied { watch } for pid=5226 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_35_52.491014686/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c793,c813 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c793,c813 tclass=file permissive=0 May 17 00:37:14.861909 kernel: audit: type=1400 audit(1747442234.851:1544): avc: denied { watch } for pid=5226 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_35_52.491014686/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c793,c813 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c793,c813 tclass=file permissive=0 May 17 00:37:14.851000 audit[5226]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001261c40 a2=fc6 a3=0 items=0 ppid=4310 pid=5226 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c793,c813 key=(null) May 17 00:37:14.882994 kernel: audit: type=1300 audit(1747442234.851:1544): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001261c40 a2=fc6 a3=0 items=0 ppid=4310 pid=5226 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c793,c813 key=(null) May 17 00:37:14.883134 kernel: audit: type=1327 audit(1747442234.851:1544): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:37:14.851000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:37:16.670718 env[1754]: 2025-05-17 00:37:14.485 [WARNING][5790] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--29--247-k8s-goldmane--8f77d7b6c--z92z5-eth0", GenerateName:"goldmane-8f77d7b6c-", Namespace:"calico-system", SelfLink:"", UID:"b130376b-e592-4257-8150-fa1595d1cccd", ResourceVersion:"1428", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"8f77d7b6c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-29-247", ContainerID:"a229e853cf7c26f450ea2e75d492ccfe1300818319c9e458f0e40bc65c1e3a68", Pod:"goldmane-8f77d7b6c-z92z5", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.127.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calie82f99ea9c5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:16.670718 env[1754]: 2025-05-17 00:37:14.502 [INFO][5790] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a" May 17 00:37:16.670718 env[1754]: 2025-05-17 00:37:14.503 [INFO][5790] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a" iface="eth0" netns="" May 17 00:37:16.670718 env[1754]: 2025-05-17 00:37:14.510 [INFO][5790] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a" May 17 00:37:16.670718 env[1754]: 2025-05-17 00:37:14.510 [INFO][5790] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a" May 17 00:37:16.670718 env[1754]: 2025-05-17 00:37:16.067 [INFO][5801] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a" HandleID="k8s-pod-network.68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a" Workload="ip--172--31--29--247-k8s-goldmane--8f77d7b6c--z92z5-eth0" May 17 00:37:16.670718 env[1754]: 2025-05-17 00:37:16.091 [INFO][5801] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:16.670718 env[1754]: 2025-05-17 00:37:16.094 [INFO][5801] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:16.670718 env[1754]: 2025-05-17 00:37:16.512 [WARNING][5801] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a" HandleID="k8s-pod-network.68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a" Workload="ip--172--31--29--247-k8s-goldmane--8f77d7b6c--z92z5-eth0" May 17 00:37:16.670718 env[1754]: 2025-05-17 00:37:16.514 [INFO][5801] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a" HandleID="k8s-pod-network.68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a" Workload="ip--172--31--29--247-k8s-goldmane--8f77d7b6c--z92z5-eth0" May 17 00:37:16.670718 env[1754]: 2025-05-17 00:37:16.598 [INFO][5801] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:16.670718 env[1754]: 2025-05-17 00:37:16.627 [INFO][5790] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a" May 17 00:37:16.670718 env[1754]: time="2025-05-17T00:37:16.670745762Z" level=info msg="TearDown network for sandbox \"68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a\" successfully" May 17 00:37:16.832986 env[1754]: time="2025-05-17T00:37:16.713629920Z" level=info msg="RemovePodSandbox \"68c16d0a84cc332346a422a64b576b80e7f72467be4d79f23f5608441768386a\" returns successfully" May 17 00:37:17.724975 systemd[1]: Started sshd@19-172.31.29.247:22-139.178.68.195:59732.service. May 17 00:37:17.768319 kernel: audit: type=1130 audit(1747442237.727:1545): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.29.247:22-139.178.68.195:59732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:17.727000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.29.247:22-139.178.68.195:59732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:18.295805 env[1754]: time="2025-05-17T00:37:18.295368630Z" level=info msg="StopPodSandbox for \"7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d\"" May 17 00:37:18.446000 audit[5808]: USER_ACCT pid=5808 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:18.466451 kernel: audit: type=1101 audit(1747442238.446:1546): pid=5808 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:18.466563 kernel: audit: type=1103 audit(1747442238.458:1547): pid=5808 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:18.468196 kernel: audit: type=1006 audit(1747442238.458:1548): pid=5808 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 May 17 00:37:18.458000 audit[5808]: CRED_ACQ pid=5808 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:18.478599 kernel: audit: type=1300 audit(1747442238.458:1548): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd39940580 a2=3 a3=0 items=0 ppid=1 pid=5808 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:18.481326 kernel: audit: type=1327 audit(1747442238.458:1548): proctitle=737368643A20636F7265205B707269765D May 17 00:37:18.458000 audit[5808]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd39940580 a2=3 a3=0 items=0 ppid=1 pid=5808 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:18.458000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:37:18.529904 sshd[5808]: Accepted publickey for core from 139.178.68.195 port 59732 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:37:18.474691 sshd[5808]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:37:18.636431 systemd-logind[1728]: New session 20 of user core. May 17 00:37:18.655000 audit[5808]: USER_START pid=5808 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:18.671208 kernel: audit: type=1105 audit(1747442238.655:1549): pid=5808 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:18.673184 kernel: audit: type=1103 audit(1747442238.664:1550): pid=5823 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:18.664000 audit[5823]: CRED_ACQ pid=5823 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:18.637608 systemd[1]: Started session-20.scope. May 17 00:37:21.146989 env[1754]: 2025-05-17 00:37:19.686 [WARNING][5818] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--29--247-k8s-calico--kube--controllers--6cbb479df8--qsnz5-eth0", GenerateName:"calico-kube-controllers-6cbb479df8-", Namespace:"calico-system", SelfLink:"", UID:"df01dd5f-5ff2-409d-b1ac-3ddcb924c138", ResourceVersion:"1179", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6cbb479df8", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-29-247", ContainerID:"d1cdc7e749c092b3887699aeb41cacdce0804581de269ca72156ba0d76f9cf11", Pod:"calico-kube-controllers-6cbb479df8-qsnz5", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.127.71/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali160441618f3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:21.146989 env[1754]: 2025-05-17 00:37:19.725 [INFO][5818] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d" May 17 00:37:21.146989 env[1754]: 2025-05-17 00:37:19.726 [INFO][5818] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d" iface="eth0" netns="" May 17 00:37:21.146989 env[1754]: 2025-05-17 00:37:19.728 [INFO][5818] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d" May 17 00:37:21.146989 env[1754]: 2025-05-17 00:37:19.728 [INFO][5818] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d" May 17 00:37:21.146989 env[1754]: 2025-05-17 00:37:20.973 [INFO][5832] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d" HandleID="k8s-pod-network.7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d" Workload="ip--172--31--29--247-k8s-calico--kube--controllers--6cbb479df8--qsnz5-eth0" May 17 00:37:21.146989 env[1754]: 2025-05-17 00:37:20.985 [INFO][5832] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:21.146989 env[1754]: 2025-05-17 00:37:20.988 [INFO][5832] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:21.146989 env[1754]: 2025-05-17 00:37:21.086 [WARNING][5832] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d" HandleID="k8s-pod-network.7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d" Workload="ip--172--31--29--247-k8s-calico--kube--controllers--6cbb479df8--qsnz5-eth0" May 17 00:37:21.146989 env[1754]: 2025-05-17 00:37:21.087 [INFO][5832] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d" HandleID="k8s-pod-network.7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d" Workload="ip--172--31--29--247-k8s-calico--kube--controllers--6cbb479df8--qsnz5-eth0" May 17 00:37:21.146989 env[1754]: 2025-05-17 00:37:21.091 [INFO][5832] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:21.146989 env[1754]: 2025-05-17 00:37:21.111 [INFO][5818] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d" May 17 00:37:21.146989 env[1754]: time="2025-05-17T00:37:21.138913154Z" level=info msg="TearDown network for sandbox \"7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d\" successfully" May 17 00:37:21.146989 env[1754]: time="2025-05-17T00:37:21.138957992Z" level=info msg="StopPodSandbox for \"7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d\" returns successfully" May 17 00:37:24.547202 env[1754]: time="2025-05-17T00:37:24.543063626Z" level=info msg="RemovePodSandbox for \"7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d\"" May 17 00:37:24.547202 env[1754]: time="2025-05-17T00:37:24.543116909Z" level=info msg="Forcibly stopping sandbox \"7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d\"" May 17 00:37:25.808846 env[1754]: 2025-05-17 00:37:25.253 [WARNING][5848] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--29--247-k8s-calico--kube--controllers--6cbb479df8--qsnz5-eth0", GenerateName:"calico-kube-controllers-6cbb479df8-", Namespace:"calico-system", SelfLink:"", UID:"df01dd5f-5ff2-409d-b1ac-3ddcb924c138", ResourceVersion:"1179", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6cbb479df8", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-29-247", ContainerID:"d1cdc7e749c092b3887699aeb41cacdce0804581de269ca72156ba0d76f9cf11", Pod:"calico-kube-controllers-6cbb479df8-qsnz5", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.127.71/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali160441618f3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:25.808846 env[1754]: 2025-05-17 00:37:25.259 [INFO][5848] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d" May 17 00:37:25.808846 env[1754]: 2025-05-17 00:37:25.259 [INFO][5848] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d" iface="eth0" netns="" May 17 00:37:25.808846 env[1754]: 2025-05-17 00:37:25.259 [INFO][5848] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d" May 17 00:37:25.808846 env[1754]: 2025-05-17 00:37:25.259 [INFO][5848] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d" May 17 00:37:25.808846 env[1754]: 2025-05-17 00:37:25.753 [INFO][5855] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d" HandleID="k8s-pod-network.7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d" Workload="ip--172--31--29--247-k8s-calico--kube--controllers--6cbb479df8--qsnz5-eth0" May 17 00:37:25.808846 env[1754]: 2025-05-17 00:37:25.760 [INFO][5855] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:25.808846 env[1754]: 2025-05-17 00:37:25.761 [INFO][5855] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:25.808846 env[1754]: 2025-05-17 00:37:25.792 [WARNING][5855] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d" HandleID="k8s-pod-network.7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d" Workload="ip--172--31--29--247-k8s-calico--kube--controllers--6cbb479df8--qsnz5-eth0" May 17 00:37:25.808846 env[1754]: 2025-05-17 00:37:25.792 [INFO][5855] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d" HandleID="k8s-pod-network.7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d" Workload="ip--172--31--29--247-k8s-calico--kube--controllers--6cbb479df8--qsnz5-eth0" May 17 00:37:25.808846 env[1754]: 2025-05-17 00:37:25.795 [INFO][5855] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:25.808846 env[1754]: 2025-05-17 00:37:25.799 [INFO][5848] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d" May 17 00:37:25.808846 env[1754]: time="2025-05-17T00:37:25.808875792Z" level=info msg="TearDown network for sandbox \"7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d\" successfully" May 17 00:37:25.875802 env[1754]: time="2025-05-17T00:37:25.828826111Z" level=info msg="RemovePodSandbox \"7646b9b3c14ae47420f2fab431ee9cb0ff18d09bfaebe4afb20428271e393f8d\" returns successfully" May 17 00:37:26.163609 sshd[5808]: pam_unix(sshd:session): session closed for user core May 17 00:37:26.232000 audit[5808]: USER_END pid=5808 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:26.255881 kernel: audit: type=1106 audit(1747442246.232:1551): pid=5808 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:26.257611 kernel: audit: type=1104 audit(1747442246.233:1552): pid=5808 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:26.233000 audit[5808]: CRED_DISP pid=5808 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:26.261385 systemd[1]: sshd@19-172.31.29.247:22-139.178.68.195:59732.service: Deactivated successfully. May 17 00:37:26.269000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.29.247:22-139.178.68.195:59732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:26.280152 kernel: audit: type=1131 audit(1747442246.269:1553): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.29.247:22-139.178.68.195:59732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:26.278975 systemd[1]: session-20.scope: Deactivated successfully. May 17 00:37:26.279163 systemd[1]: session-20.scope: Consumed 1.671s CPU time. May 17 00:37:26.282927 systemd-logind[1728]: Session 20 logged out. Waiting for processes to exit. May 17 00:37:26.297249 systemd-logind[1728]: Removed session 20. May 17 00:37:26.537667 env[1754]: time="2025-05-17T00:37:26.536746721Z" level=info msg="StopPodSandbox for \"eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7\"" May 17 00:37:27.615341 kubelet[2612]: E0517 00:37:27.615262 2612 kubelet.go:2512] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="9.983s" May 17 00:37:28.011289 env[1754]: 2025-05-17 00:37:27.387 [WARNING][5888] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7" WorkloadEndpoint="ip--172--31--29--247-k8s-whisker--6bfc64555d--67wfk-eth0" May 17 00:37:28.011289 env[1754]: 2025-05-17 00:37:27.390 [INFO][5888] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7" May 17 00:37:28.011289 env[1754]: 2025-05-17 00:37:27.390 [INFO][5888] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7" iface="eth0" netns="" May 17 00:37:28.011289 env[1754]: 2025-05-17 00:37:27.390 [INFO][5888] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7" May 17 00:37:28.011289 env[1754]: 2025-05-17 00:37:27.390 [INFO][5888] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7" May 17 00:37:28.011289 env[1754]: 2025-05-17 00:37:27.936 [INFO][5899] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7" HandleID="k8s-pod-network.eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7" Workload="ip--172--31--29--247-k8s-whisker--6bfc64555d--67wfk-eth0" May 17 00:37:28.011289 env[1754]: 2025-05-17 00:37:27.942 [INFO][5899] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:28.011289 env[1754]: 2025-05-17 00:37:27.944 [INFO][5899] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:28.011289 env[1754]: 2025-05-17 00:37:27.989 [WARNING][5899] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7" HandleID="k8s-pod-network.eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7" Workload="ip--172--31--29--247-k8s-whisker--6bfc64555d--67wfk-eth0" May 17 00:37:28.011289 env[1754]: 2025-05-17 00:37:27.989 [INFO][5899] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7" HandleID="k8s-pod-network.eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7" Workload="ip--172--31--29--247-k8s-whisker--6bfc64555d--67wfk-eth0" May 17 00:37:28.011289 env[1754]: 2025-05-17 00:37:27.994 [INFO][5899] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:28.011289 env[1754]: 2025-05-17 00:37:27.999 [INFO][5888] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7" May 17 00:37:28.024948 env[1754]: time="2025-05-17T00:37:28.011844419Z" level=info msg="TearDown network for sandbox \"eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7\" successfully" May 17 00:37:28.024948 env[1754]: time="2025-05-17T00:37:28.011885530Z" level=info msg="StopPodSandbox for \"eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7\" returns successfully" May 17 00:37:28.134568 env[1754]: time="2025-05-17T00:37:28.134502523Z" level=info msg="RemovePodSandbox for \"eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7\"" May 17 00:37:28.134568 env[1754]: time="2025-05-17T00:37:28.134541601Z" level=info msg="Forcibly stopping sandbox \"eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7\"" May 17 00:37:28.227618 kubelet[2612]: E0517 00:37:28.227555 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\"\"" pod="calico-system/goldmane-8f77d7b6c-z92z5" podUID="b130376b-e592-4257-8150-fa1595d1cccd" May 17 00:37:28.228810 kubelet[2612]: E0517 00:37:28.228760 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\"\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\"\"]" pod="calico-system/whisker-6785c57cdd-4bhsp" podUID="dc702640-bf99-40cf-827b-6579c54fc4b2" May 17 00:37:31.316390 systemd[1]: Started sshd@20-172.31.29.247:22-139.178.68.195:37976.service. May 17 00:37:31.483159 kernel: audit: type=1130 audit(1747442251.324:1554): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.29.247:22-139.178.68.195:37976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:31.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.29.247:22-139.178.68.195:37976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:31.508365 env[1754]: 2025-05-17 00:37:28.637 [WARNING][5914] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7" WorkloadEndpoint="ip--172--31--29--247-k8s-whisker--6bfc64555d--67wfk-eth0" May 17 00:37:31.508365 env[1754]: 2025-05-17 00:37:28.663 [INFO][5914] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7" May 17 00:37:31.508365 env[1754]: 2025-05-17 00:37:28.663 [INFO][5914] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7" iface="eth0" netns="" May 17 00:37:31.508365 env[1754]: 2025-05-17 00:37:28.663 [INFO][5914] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7" May 17 00:37:31.508365 env[1754]: 2025-05-17 00:37:28.663 [INFO][5914] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7" May 17 00:37:31.508365 env[1754]: 2025-05-17 00:37:31.049 [INFO][5922] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7" HandleID="k8s-pod-network.eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7" Workload="ip--172--31--29--247-k8s-whisker--6bfc64555d--67wfk-eth0" May 17 00:37:31.508365 env[1754]: 2025-05-17 00:37:31.076 [INFO][5922] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:31.508365 env[1754]: 2025-05-17 00:37:31.079 [INFO][5922] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:31.508365 env[1754]: 2025-05-17 00:37:31.263 [WARNING][5922] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7" HandleID="k8s-pod-network.eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7" Workload="ip--172--31--29--247-k8s-whisker--6bfc64555d--67wfk-eth0" May 17 00:37:31.508365 env[1754]: 2025-05-17 00:37:31.263 [INFO][5922] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7" HandleID="k8s-pod-network.eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7" Workload="ip--172--31--29--247-k8s-whisker--6bfc64555d--67wfk-eth0" May 17 00:37:31.508365 env[1754]: 2025-05-17 00:37:31.273 [INFO][5922] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:31.508365 env[1754]: 2025-05-17 00:37:31.332 [INFO][5914] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7" May 17 00:37:31.508365 env[1754]: time="2025-05-17T00:37:31.393877802Z" level=info msg="TearDown network for sandbox \"eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7\" successfully" May 17 00:37:31.508365 env[1754]: time="2025-05-17T00:37:31.470682776Z" level=info msg="RemovePodSandbox \"eb353640fcaad4a247c3db045d0046d2a46f8a446a733ec497dcdca0d8eb60f7\" returns successfully" May 17 00:37:31.887000 audit[5937]: USER_ACCT pid=5937 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:31.907827 kernel: audit: type=1101 audit(1747442251.887:1555): pid=5937 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:31.907954 kernel: audit: type=1103 audit(1747442251.895:1556): pid=5937 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:31.907985 kernel: audit: type=1006 audit(1747442251.895:1557): pid=5937 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 May 17 00:37:31.895000 audit[5937]: CRED_ACQ pid=5937 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:31.909030 kernel: audit: type=1300 audit(1747442251.895:1557): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd238b5b50 a2=3 a3=0 items=0 ppid=1 pid=5937 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:31.895000 audit[5937]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd238b5b50 a2=3 a3=0 items=0 ppid=1 pid=5937 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:31.925951 kernel: audit: type=1327 audit(1747442251.895:1557): proctitle=737368643A20636F7265205B707269765D May 17 00:37:31.895000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:37:31.926300 sshd[5937]: Accepted publickey for core from 139.178.68.195 port 37976 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:37:31.917028 sshd[5937]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:37:31.974498 systemd-logind[1728]: New session 21 of user core. May 17 00:37:31.976897 systemd[1]: Started session-21.scope. May 17 00:37:32.009000 audit[5937]: USER_START pid=5937 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:32.023200 kernel: audit: type=1105 audit(1747442252.009:1558): pid=5937 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:32.023377 kernel: audit: type=1103 audit(1747442252.019:1559): pid=5941 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:32.019000 audit[5941]: CRED_ACQ pid=5941 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:32.677637 env[1754]: time="2025-05-17T00:37:32.677053384Z" level=info msg="StopPodSandbox for \"6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7\"" May 17 00:37:34.803362 env[1754]: 2025-05-17 00:37:33.544 [WARNING][5958] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--29--247-k8s-calico--apiserver--7fb9df588d--8ffw4-eth0", GenerateName:"calico-apiserver-7fb9df588d-", Namespace:"calico-apiserver", SelfLink:"", UID:"68cbb9bc-cdf9-4a9a-ac87-6f23197e12aa", ResourceVersion:"1111", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7fb9df588d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-29-247", ContainerID:"d5f51fd7ee1ecf3cd020be4822fe0c76e5db0240deabffc12dd59b7fdf843d48", Pod:"calico-apiserver-7fb9df588d-8ffw4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.127.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali03cfdfc282b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:34.803362 env[1754]: 2025-05-17 00:37:33.554 [INFO][5958] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7" May 17 00:37:34.803362 env[1754]: 2025-05-17 00:37:33.555 [INFO][5958] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7" iface="eth0" netns="" May 17 00:37:34.803362 env[1754]: 2025-05-17 00:37:33.555 [INFO][5958] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7" May 17 00:37:34.803362 env[1754]: 2025-05-17 00:37:33.555 [INFO][5958] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7" May 17 00:37:34.803362 env[1754]: 2025-05-17 00:37:34.197 [INFO][5966] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7" HandleID="k8s-pod-network.6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7" Workload="ip--172--31--29--247-k8s-calico--apiserver--7fb9df588d--8ffw4-eth0" May 17 00:37:34.803362 env[1754]: 2025-05-17 00:37:34.215 [INFO][5966] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:34.803362 env[1754]: 2025-05-17 00:37:34.217 [INFO][5966] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:34.803362 env[1754]: 2025-05-17 00:37:34.680 [WARNING][5966] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7" HandleID="k8s-pod-network.6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7" Workload="ip--172--31--29--247-k8s-calico--apiserver--7fb9df588d--8ffw4-eth0" May 17 00:37:34.803362 env[1754]: 2025-05-17 00:37:34.681 [INFO][5966] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7" HandleID="k8s-pod-network.6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7" Workload="ip--172--31--29--247-k8s-calico--apiserver--7fb9df588d--8ffw4-eth0" May 17 00:37:34.803362 env[1754]: 2025-05-17 00:37:34.684 [INFO][5966] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:34.803362 env[1754]: 2025-05-17 00:37:34.725 [INFO][5958] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7" May 17 00:37:34.803362 env[1754]: time="2025-05-17T00:37:34.788795882Z" level=info msg="TearDown network for sandbox \"6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7\" successfully" May 17 00:37:34.803362 env[1754]: time="2025-05-17T00:37:34.788847193Z" level=info msg="StopPodSandbox for \"6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7\" returns successfully" May 17 00:37:41.742000 audit[2468]: AVC avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:41.862553 kernel: audit: type=1400 audit(1747442261.742:1560): avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:41.864935 kernel: audit: type=1300 audit(1747442261.742:1560): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0015964a0 a2=fc6 a3=0 items=0 ppid=2314 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 key=(null) May 17 00:37:41.864995 kernel: audit: type=1327 audit(1747442261.742:1560): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:37:41.865023 kernel: audit: type=1400 audit(1747442261.742:1561): avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:41.866436 kernel: audit: type=1300 audit(1747442261.742:1561): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00187a2d0 a2=fc6 a3=0 items=0 ppid=2314 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 key=(null) May 17 00:37:41.866518 kernel: audit: type=1327 audit(1747442261.742:1561): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:37:41.742000 audit[2468]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0015964a0 a2=fc6 a3=0 items=0 ppid=2314 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 key=(null) May 17 00:37:41.742000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:37:41.742000 audit[2468]: AVC avc: denied { watch } for pid=2468 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:41.742000 audit[2468]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00187a2d0 a2=fc6 a3=0 items=0 ppid=2314 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c134,c427 key=(null) May 17 00:37:41.742000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:37:42.567692 sshd[5937]: pam_unix(sshd:session): session closed for user core May 17 00:37:42.617000 audit[5937]: USER_END pid=5937 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:42.628728 kernel: audit: type=1106 audit(1747442262.617:1562): pid=5937 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:42.619000 audit[5937]: CRED_DISP pid=5937 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:42.637726 kernel: audit: type=1104 audit(1747442262.619:1563): pid=5937 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:42.653322 systemd[1]: sshd@20-172.31.29.247:22-139.178.68.195:37976.service: Deactivated successfully. May 17 00:37:42.663000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.29.247:22-139.178.68.195:37976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:42.674857 kernel: audit: type=1131 audit(1747442262.663:1564): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.29.247:22-139.178.68.195:37976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:42.668427 systemd[1]: session-21.scope: Deactivated successfully. May 17 00:37:42.668622 systemd[1]: session-21.scope: Consumed 2.598s CPU time. May 17 00:37:42.670737 systemd-logind[1728]: Session 21 logged out. Waiting for processes to exit. May 17 00:37:42.683195 systemd-logind[1728]: Removed session 21. May 17 00:37:43.730263 env[1754]: time="2025-05-17T00:37:43.730213757Z" level=info msg="RemovePodSandbox for \"6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7\"" May 17 00:37:43.748256 env[1754]: time="2025-05-17T00:37:43.730279442Z" level=info msg="Forcibly stopping sandbox \"6c8a057e9f2e724bc9816ebdc9b175f0e13b316501a463af355db16a84ae5db7\"" May 17 00:37:43.956978 kubelet[2612]: E0517 00:37:43.956921 2612 kubelet.go:2512] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="13.307s" May 17 00:37:44.247873 env[1754]: time="2025-05-17T00:37:44.247742457Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:37:44.275071 kubelet[2612]: E0517 00:37:44.275023 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\"\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\"\"]" pod="calico-system/whisker-6785c57cdd-4bhsp" podUID="dc702640-bf99-40cf-827b-6579c54fc4b2" May 17 00:37:44.456776 env[1754]: time="2025-05-17T00:37:44.456633111Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:37:44.459002 env[1754]: time="2025-05-17T00:37:44.458946070Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:37:44.476559 kubelet[2612]: E0517 00:37:44.472149 2612 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:37:44.484658 kubelet[2612]: E0517 00:37:44.482602 2612 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:37:44.529119 kubelet[2612]: E0517 00:37:44.528987 2612 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-h4l9s,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-8f77d7b6c-z92z5_calico-system(b130376b-e592-4257-8150-fa1595d1cccd): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:37:44.538623 kubelet[2612]: E0517 00:37:44.530477 2612 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-8f77d7b6c-z92z5" podUID="b130376b-e592-4257-8150-fa1595d1cccd"