Jul 12 00:24:12.026945 kernel: Booting Linux on physical CPU 0x0000000000 [0x410fd083] Jul 12 00:24:12.026985 kernel: Linux version 5.15.186-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Jul 11 23:15:18 -00 2025 Jul 12 00:24:12.027007 kernel: efi: EFI v2.70 by EDK II Jul 12 00:24:12.027022 kernel: efi: SMBIOS=0x7bed0000 SMBIOS 3.0=0x7beb0000 ACPI=0x786e0000 ACPI 2.0=0x786e0014 MEMATTR=0x7affea98 MEMRESERVE=0x716fcf98 Jul 12 00:24:12.027036 kernel: ACPI: Early table checksum verification disabled Jul 12 00:24:12.027049 kernel: ACPI: RSDP 0x00000000786E0014 000024 (v02 AMAZON) Jul 12 00:24:12.027065 kernel: ACPI: XSDT 0x00000000786D00E8 000064 (v01 AMAZON AMZNFACP 00000001 01000013) Jul 12 00:24:12.027079 kernel: ACPI: FACP 0x00000000786B0000 000114 (v06 AMAZON AMZNFACP 00000001 AMZN 00000001) Jul 12 00:24:12.027093 kernel: ACPI: DSDT 0x0000000078640000 00159D (v02 AMAZON AMZNDSDT 00000001 INTL 20160527) Jul 12 00:24:12.027106 kernel: ACPI: APIC 0x00000000786C0000 000108 (v04 AMAZON AMZNAPIC 00000001 AMZN 00000001) Jul 12 00:24:12.027124 kernel: ACPI: SPCR 0x00000000786A0000 000050 (v02 AMAZON AMZNSPCR 00000001 AMZN 00000001) Jul 12 00:24:12.027137 kernel: ACPI: GTDT 0x0000000078690000 000060 (v02 AMAZON AMZNGTDT 00000001 AMZN 00000001) Jul 12 00:24:12.027151 kernel: ACPI: MCFG 0x0000000078680000 00003C (v02 AMAZON AMZNMCFG 00000001 AMZN 00000001) Jul 12 00:24:12.027165 kernel: ACPI: SLIT 0x0000000078670000 00002D (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Jul 12 00:24:12.027181 kernel: ACPI: IORT 0x0000000078660000 000078 (v01 AMAZON AMZNIORT 00000001 AMZN 00000001) Jul 12 00:24:12.027200 kernel: ACPI: PPTT 0x0000000078650000 0000EC (v01 AMAZON AMZNPPTT 00000001 AMZN 00000001) Jul 12 00:24:12.027214 kernel: ACPI: SPCR: console: uart,mmio,0x90a0000,115200 Jul 12 00:24:12.027228 kernel: earlycon: uart0 at MMIO 0x00000000090a0000 (options '115200') Jul 12 00:24:12.027242 kernel: printk: bootconsole [uart0] enabled Jul 12 00:24:12.027256 kernel: NUMA: Failed to initialise from firmware Jul 12 00:24:12.027270 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000004b5ffffff] Jul 12 00:24:12.027285 kernel: NUMA: NODE_DATA [mem 0x4b5843900-0x4b5848fff] Jul 12 00:24:12.027299 kernel: Zone ranges: Jul 12 00:24:12.027313 kernel: DMA [mem 0x0000000040000000-0x00000000ffffffff] Jul 12 00:24:12.027327 kernel: DMA32 empty Jul 12 00:24:12.027341 kernel: Normal [mem 0x0000000100000000-0x00000004b5ffffff] Jul 12 00:24:12.027359 kernel: Movable zone start for each node Jul 12 00:24:12.027373 kernel: Early memory node ranges Jul 12 00:24:12.027387 kernel: node 0: [mem 0x0000000040000000-0x000000007862ffff] Jul 12 00:24:12.027402 kernel: node 0: [mem 0x0000000078630000-0x000000007863ffff] Jul 12 00:24:12.027416 kernel: node 0: [mem 0x0000000078640000-0x00000000786effff] Jul 12 00:24:12.027430 kernel: node 0: [mem 0x00000000786f0000-0x000000007872ffff] Jul 12 00:24:12.027444 kernel: node 0: [mem 0x0000000078730000-0x000000007bbfffff] Jul 12 00:24:12.027458 kernel: node 0: [mem 0x000000007bc00000-0x000000007bfdffff] Jul 12 00:24:12.027473 kernel: node 0: [mem 0x000000007bfe0000-0x000000007fffffff] Jul 12 00:24:12.027487 kernel: node 0: [mem 0x0000000400000000-0x00000004b5ffffff] Jul 12 00:24:12.027501 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000004b5ffffff] Jul 12 00:24:12.027515 kernel: On node 0, zone Normal: 8192 pages in unavailable ranges Jul 12 00:24:12.027534 kernel: psci: probing for conduit method from ACPI. Jul 12 00:24:12.027549 kernel: psci: PSCIv1.0 detected in firmware. Jul 12 00:24:12.027570 kernel: psci: Using standard PSCI v0.2 function IDs Jul 12 00:24:12.027585 kernel: psci: Trusted OS migration not required Jul 12 00:24:12.027600 kernel: psci: SMC Calling Convention v1.1 Jul 12 00:24:12.027619 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000001) Jul 12 00:24:12.027634 kernel: ACPI: SRAT not present Jul 12 00:24:12.027649 kernel: percpu: Embedded 30 pages/cpu s82968 r8192 d31720 u122880 Jul 12 00:24:12.027664 kernel: pcpu-alloc: s82968 r8192 d31720 u122880 alloc=30*4096 Jul 12 00:24:12.027702 kernel: pcpu-alloc: [0] 0 [0] 1 Jul 12 00:24:12.027721 kernel: Detected PIPT I-cache on CPU0 Jul 12 00:24:12.027736 kernel: CPU features: detected: GIC system register CPU interface Jul 12 00:24:12.027752 kernel: CPU features: detected: Spectre-v2 Jul 12 00:24:12.027766 kernel: CPU features: detected: Spectre-v3a Jul 12 00:24:12.027781 kernel: CPU features: detected: Spectre-BHB Jul 12 00:24:12.027796 kernel: CPU features: kernel page table isolation forced ON by KASLR Jul 12 00:24:12.027817 kernel: CPU features: detected: Kernel page table isolation (KPTI) Jul 12 00:24:12.027833 kernel: CPU features: detected: ARM erratum 1742098 Jul 12 00:24:12.027848 kernel: CPU features: detected: ARM errata 1165522, 1319367, or 1530923 Jul 12 00:24:12.027863 kernel: Built 1 zonelists, mobility grouping on. Total pages: 991872 Jul 12 00:24:12.027878 kernel: Policy zone: Normal Jul 12 00:24:12.027895 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=6cb548cec1e3020e9c3dcbc1d7670f4d8bdc2e3c8e062898ccaed7fc9d588f65 Jul 12 00:24:12.027911 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jul 12 00:24:12.027926 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Jul 12 00:24:12.027942 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jul 12 00:24:12.027956 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jul 12 00:24:12.027976 kernel: software IO TLB: mapped [mem 0x000000007c000000-0x0000000080000000] (64MB) Jul 12 00:24:12.027993 kernel: Memory: 3824460K/4030464K available (9792K kernel code, 2094K rwdata, 7588K rodata, 36416K init, 777K bss, 206004K reserved, 0K cma-reserved) Jul 12 00:24:12.028008 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Jul 12 00:24:12.028023 kernel: trace event string verifier disabled Jul 12 00:24:12.028038 kernel: rcu: Preemptible hierarchical RCU implementation. Jul 12 00:24:12.028054 kernel: rcu: RCU event tracing is enabled. Jul 12 00:24:12.028069 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Jul 12 00:24:12.028085 kernel: Trampoline variant of Tasks RCU enabled. Jul 12 00:24:12.028100 kernel: Tracing variant of Tasks RCU enabled. Jul 12 00:24:12.028115 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jul 12 00:24:12.028130 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Jul 12 00:24:12.028145 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Jul 12 00:24:12.028165 kernel: GICv3: 96 SPIs implemented Jul 12 00:24:12.028179 kernel: GICv3: 0 Extended SPIs implemented Jul 12 00:24:12.028194 kernel: GICv3: Distributor has no Range Selector support Jul 12 00:24:12.028209 kernel: Root IRQ handler: gic_handle_irq Jul 12 00:24:12.028224 kernel: GICv3: 16 PPIs implemented Jul 12 00:24:12.028239 kernel: GICv3: CPU0: found redistributor 0 region 0:0x0000000010200000 Jul 12 00:24:12.028254 kernel: ACPI: SRAT not present Jul 12 00:24:12.028319 kernel: ITS [mem 0x10080000-0x1009ffff] Jul 12 00:24:12.028344 kernel: ITS@0x0000000010080000: allocated 8192 Devices @400090000 (indirect, esz 8, psz 64K, shr 1) Jul 12 00:24:12.028361 kernel: ITS@0x0000000010080000: allocated 8192 Interrupt Collections @4000a0000 (flat, esz 8, psz 64K, shr 1) Jul 12 00:24:12.028376 kernel: GICv3: using LPI property table @0x00000004000b0000 Jul 12 00:24:12.028400 kernel: ITS: Using hypervisor restricted LPI range [128] Jul 12 00:24:12.028416 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000004000d0000 Jul 12 00:24:12.028431 kernel: arch_timer: cp15 timer(s) running at 83.33MHz (virt). Jul 12 00:24:12.028447 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x13381ebeec, max_idle_ns: 440795203145 ns Jul 12 00:24:12.028462 kernel: sched_clock: 56 bits at 83MHz, resolution 12ns, wraps every 4398046511100ns Jul 12 00:24:12.028477 kernel: Console: colour dummy device 80x25 Jul 12 00:24:12.028493 kernel: printk: console [tty1] enabled Jul 12 00:24:12.028509 kernel: ACPI: Core revision 20210730 Jul 12 00:24:12.028525 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 166.66 BogoMIPS (lpj=83333) Jul 12 00:24:12.028540 kernel: pid_max: default: 32768 minimum: 301 Jul 12 00:24:12.028562 kernel: LSM: Security Framework initializing Jul 12 00:24:12.028578 kernel: SELinux: Initializing. Jul 12 00:24:12.028593 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 12 00:24:12.028609 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 12 00:24:12.028625 kernel: rcu: Hierarchical SRCU implementation. Jul 12 00:24:12.028640 kernel: Platform MSI: ITS@0x10080000 domain created Jul 12 00:24:12.028656 kernel: PCI/MSI: ITS@0x10080000 domain created Jul 12 00:24:12.028671 kernel: Remapping and enabling EFI services. Jul 12 00:24:12.028780 kernel: smp: Bringing up secondary CPUs ... Jul 12 00:24:12.028798 kernel: Detected PIPT I-cache on CPU1 Jul 12 00:24:12.028821 kernel: GICv3: CPU1: found redistributor 1 region 0:0x0000000010220000 Jul 12 00:24:12.028837 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000004000e0000 Jul 12 00:24:12.028853 kernel: CPU1: Booted secondary processor 0x0000000001 [0x410fd083] Jul 12 00:24:12.028868 kernel: smp: Brought up 1 node, 2 CPUs Jul 12 00:24:12.028884 kernel: SMP: Total of 2 processors activated. Jul 12 00:24:12.028899 kernel: CPU features: detected: 32-bit EL0 Support Jul 12 00:24:12.028915 kernel: CPU features: detected: 32-bit EL1 Support Jul 12 00:24:12.028931 kernel: CPU features: detected: CRC32 instructions Jul 12 00:24:12.028946 kernel: CPU: All CPU(s) started at EL1 Jul 12 00:24:12.028968 kernel: alternatives: patching kernel code Jul 12 00:24:12.028983 kernel: devtmpfs: initialized Jul 12 00:24:12.029009 kernel: KASLR disabled due to lack of seed Jul 12 00:24:12.029029 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jul 12 00:24:12.029046 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Jul 12 00:24:12.029062 kernel: pinctrl core: initialized pinctrl subsystem Jul 12 00:24:12.029078 kernel: SMBIOS 3.0.0 present. Jul 12 00:24:12.029094 kernel: DMI: Amazon EC2 a1.large/, BIOS 1.0 11/1/2018 Jul 12 00:24:12.029110 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jul 12 00:24:12.029126 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Jul 12 00:24:12.029143 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Jul 12 00:24:12.029164 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Jul 12 00:24:12.029180 kernel: audit: initializing netlink subsys (disabled) Jul 12 00:24:12.029196 kernel: audit: type=2000 audit(0.310:1): state=initialized audit_enabled=0 res=1 Jul 12 00:24:12.029212 kernel: thermal_sys: Registered thermal governor 'step_wise' Jul 12 00:24:12.029228 kernel: cpuidle: using governor menu Jul 12 00:24:12.029248 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Jul 12 00:24:12.029265 kernel: ASID allocator initialised with 32768 entries Jul 12 00:24:12.029281 kernel: ACPI: bus type PCI registered Jul 12 00:24:12.029297 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jul 12 00:24:12.029313 kernel: Serial: AMBA PL011 UART driver Jul 12 00:24:12.029329 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jul 12 00:24:12.029345 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Jul 12 00:24:12.029361 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jul 12 00:24:12.029377 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Jul 12 00:24:12.029398 kernel: cryptd: max_cpu_qlen set to 1000 Jul 12 00:24:12.029415 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Jul 12 00:24:12.029430 kernel: ACPI: Added _OSI(Module Device) Jul 12 00:24:12.029447 kernel: ACPI: Added _OSI(Processor Device) Jul 12 00:24:12.029462 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jul 12 00:24:12.029478 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jul 12 00:24:12.029494 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jul 12 00:24:12.029510 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jul 12 00:24:12.029527 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Jul 12 00:24:12.029542 kernel: ACPI: Interpreter enabled Jul 12 00:24:12.029563 kernel: ACPI: Using GIC for interrupt routing Jul 12 00:24:12.029579 kernel: ACPI: MCFG table detected, 1 entries Jul 12 00:24:12.029595 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-0f]) Jul 12 00:24:12.029949 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Jul 12 00:24:12.030160 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Jul 12 00:24:12.030356 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Jul 12 00:24:12.030554 kernel: acpi PNP0A08:00: ECAM area [mem 0x20000000-0x20ffffff] reserved by PNP0C02:00 Jul 12 00:24:12.030795 kernel: acpi PNP0A08:00: ECAM at [mem 0x20000000-0x20ffffff] for [bus 00-0f] Jul 12 00:24:12.030821 kernel: ACPI: Remapped I/O 0x000000001fff0000 to [io 0x0000-0xffff window] Jul 12 00:24:12.030838 kernel: acpiphp: Slot [1] registered Jul 12 00:24:12.030854 kernel: acpiphp: Slot [2] registered Jul 12 00:24:12.030870 kernel: acpiphp: Slot [3] registered Jul 12 00:24:12.030886 kernel: acpiphp: Slot [4] registered Jul 12 00:24:12.030902 kernel: acpiphp: Slot [5] registered Jul 12 00:24:12.030918 kernel: acpiphp: Slot [6] registered Jul 12 00:24:12.030933 kernel: acpiphp: Slot [7] registered Jul 12 00:24:12.030956 kernel: acpiphp: Slot [8] registered Jul 12 00:24:12.030972 kernel: acpiphp: Slot [9] registered Jul 12 00:24:12.030988 kernel: acpiphp: Slot [10] registered Jul 12 00:24:12.043748 kernel: acpiphp: Slot [11] registered Jul 12 00:24:12.043774 kernel: acpiphp: Slot [12] registered Jul 12 00:24:12.043792 kernel: acpiphp: Slot [13] registered Jul 12 00:24:12.043808 kernel: acpiphp: Slot [14] registered Jul 12 00:24:12.043824 kernel: acpiphp: Slot [15] registered Jul 12 00:24:12.043840 kernel: acpiphp: Slot [16] registered Jul 12 00:24:12.043868 kernel: acpiphp: Slot [17] registered Jul 12 00:24:12.043885 kernel: acpiphp: Slot [18] registered Jul 12 00:24:12.043900 kernel: acpiphp: Slot [19] registered Jul 12 00:24:12.043916 kernel: acpiphp: Slot [20] registered Jul 12 00:24:12.043932 kernel: acpiphp: Slot [21] registered Jul 12 00:24:12.043947 kernel: acpiphp: Slot [22] registered Jul 12 00:24:12.043963 kernel: acpiphp: Slot [23] registered Jul 12 00:24:12.043979 kernel: acpiphp: Slot [24] registered Jul 12 00:24:12.043994 kernel: acpiphp: Slot [25] registered Jul 12 00:24:12.044010 kernel: acpiphp: Slot [26] registered Jul 12 00:24:12.044030 kernel: acpiphp: Slot [27] registered Jul 12 00:24:12.044046 kernel: acpiphp: Slot [28] registered Jul 12 00:24:12.044061 kernel: acpiphp: Slot [29] registered Jul 12 00:24:12.044077 kernel: acpiphp: Slot [30] registered Jul 12 00:24:12.044093 kernel: acpiphp: Slot [31] registered Jul 12 00:24:12.044109 kernel: PCI host bridge to bus 0000:00 Jul 12 00:24:12.044347 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xffffffff window] Jul 12 00:24:12.044531 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Jul 12 00:24:12.044775 kernel: pci_bus 0000:00: root bus resource [mem 0x400000000000-0x407fffffffff window] Jul 12 00:24:12.045018 kernel: pci_bus 0000:00: root bus resource [bus 00-0f] Jul 12 00:24:12.048902 kernel: pci 0000:00:00.0: [1d0f:0200] type 00 class 0x060000 Jul 12 00:24:12.049140 kernel: pci 0000:00:01.0: [1d0f:8250] type 00 class 0x070003 Jul 12 00:24:12.049334 kernel: pci 0000:00:01.0: reg 0x10: [mem 0x80118000-0x80118fff] Jul 12 00:24:12.049557 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Jul 12 00:24:12.049830 kernel: pci 0000:00:04.0: reg 0x10: [mem 0x80114000-0x80117fff] Jul 12 00:24:12.050061 kernel: pci 0000:00:04.0: PME# supported from D0 D1 D2 D3hot D3cold Jul 12 00:24:12.050296 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Jul 12 00:24:12.050514 kernel: pci 0000:00:05.0: reg 0x10: [mem 0x80110000-0x80113fff] Jul 12 00:24:12.050781 kernel: pci 0000:00:05.0: reg 0x18: [mem 0x80000000-0x800fffff pref] Jul 12 00:24:12.050996 kernel: pci 0000:00:05.0: reg 0x20: [mem 0x80100000-0x8010ffff] Jul 12 00:24:12.051196 kernel: pci 0000:00:05.0: PME# supported from D0 D1 D2 D3hot D3cold Jul 12 00:24:12.051404 kernel: pci 0000:00:05.0: BAR 2: assigned [mem 0x80000000-0x800fffff pref] Jul 12 00:24:12.051609 kernel: pci 0000:00:05.0: BAR 4: assigned [mem 0x80100000-0x8010ffff] Jul 12 00:24:12.051873 kernel: pci 0000:00:04.0: BAR 0: assigned [mem 0x80110000-0x80113fff] Jul 12 00:24:12.052075 kernel: pci 0000:00:05.0: BAR 0: assigned [mem 0x80114000-0x80117fff] Jul 12 00:24:12.052276 kernel: pci 0000:00:01.0: BAR 0: assigned [mem 0x80118000-0x80118fff] Jul 12 00:24:12.052458 kernel: pci_bus 0000:00: resource 4 [mem 0x80000000-0xffffffff window] Jul 12 00:24:12.052632 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Jul 12 00:24:12.060495 kernel: pci_bus 0000:00: resource 6 [mem 0x400000000000-0x407fffffffff window] Jul 12 00:24:12.060543 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Jul 12 00:24:12.060561 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Jul 12 00:24:12.060578 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Jul 12 00:24:12.060595 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Jul 12 00:24:12.060612 kernel: iommu: Default domain type: Translated Jul 12 00:24:12.060629 kernel: iommu: DMA domain TLB invalidation policy: strict mode Jul 12 00:24:12.060645 kernel: vgaarb: loaded Jul 12 00:24:12.060662 kernel: pps_core: LinuxPPS API ver. 1 registered Jul 12 00:24:12.060807 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jul 12 00:24:12.060879 kernel: PTP clock support registered Jul 12 00:24:12.060897 kernel: Registered efivars operations Jul 12 00:24:12.060914 kernel: clocksource: Switched to clocksource arch_sys_counter Jul 12 00:24:12.060931 kernel: VFS: Disk quotas dquot_6.6.0 Jul 12 00:24:12.060947 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jul 12 00:24:12.060964 kernel: pnp: PnP ACPI init Jul 12 00:24:12.061222 kernel: system 00:00: [mem 0x20000000-0x2fffffff] could not be reserved Jul 12 00:24:12.061261 kernel: pnp: PnP ACPI: found 1 devices Jul 12 00:24:12.061278 kernel: NET: Registered PF_INET protocol family Jul 12 00:24:12.061295 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Jul 12 00:24:12.061311 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Jul 12 00:24:12.061328 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jul 12 00:24:12.061344 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Jul 12 00:24:12.061361 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Jul 12 00:24:12.061377 kernel: TCP: Hash tables configured (established 32768 bind 32768) Jul 12 00:24:12.061393 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 12 00:24:12.061415 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 12 00:24:12.061432 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jul 12 00:24:12.061449 kernel: PCI: CLS 0 bytes, default 64 Jul 12 00:24:12.061465 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 3 counters available Jul 12 00:24:12.061482 kernel: kvm [1]: HYP mode not available Jul 12 00:24:12.061498 kernel: Initialise system trusted keyrings Jul 12 00:24:12.061515 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Jul 12 00:24:12.061531 kernel: Key type asymmetric registered Jul 12 00:24:12.061547 kernel: Asymmetric key parser 'x509' registered Jul 12 00:24:12.061569 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Jul 12 00:24:12.061585 kernel: io scheduler mq-deadline registered Jul 12 00:24:12.061601 kernel: io scheduler kyber registered Jul 12 00:24:12.061617 kernel: io scheduler bfq registered Jul 12 00:24:12.061954 kernel: pl061_gpio ARMH0061:00: PL061 GPIO chip registered Jul 12 00:24:12.061990 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Jul 12 00:24:12.062007 kernel: ACPI: button: Power Button [PWRB] Jul 12 00:24:12.062024 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input1 Jul 12 00:24:12.062040 kernel: ACPI: button: Sleep Button [SLPB] Jul 12 00:24:12.062065 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jul 12 00:24:12.062082 kernel: ACPI: \_SB_.PCI0.GSI2: Enabled at IRQ 37 Jul 12 00:24:12.062304 kernel: serial 0000:00:01.0: enabling device (0010 -> 0012) Jul 12 00:24:12.062331 kernel: printk: console [ttyS0] disabled Jul 12 00:24:12.062348 kernel: 0000:00:01.0: ttyS0 at MMIO 0x80118000 (irq = 14, base_baud = 115200) is a 16550A Jul 12 00:24:12.062364 kernel: printk: console [ttyS0] enabled Jul 12 00:24:12.062380 kernel: printk: bootconsole [uart0] disabled Jul 12 00:24:12.062396 kernel: thunder_xcv, ver 1.0 Jul 12 00:24:12.062412 kernel: thunder_bgx, ver 1.0 Jul 12 00:24:12.062436 kernel: nicpf, ver 1.0 Jul 12 00:24:12.062451 kernel: nicvf, ver 1.0 Jul 12 00:24:12.062667 kernel: rtc-efi rtc-efi.0: registered as rtc0 Jul 12 00:24:12.069391 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-07-12T00:24:11 UTC (1752279851) Jul 12 00:24:12.069450 kernel: hid: raw HID events driver (C) Jiri Kosina Jul 12 00:24:12.069495 kernel: NET: Registered PF_INET6 protocol family Jul 12 00:24:12.069512 kernel: Segment Routing with IPv6 Jul 12 00:24:12.069529 kernel: In-situ OAM (IOAM) with IPv6 Jul 12 00:24:12.069555 kernel: NET: Registered PF_PACKET protocol family Jul 12 00:24:12.069571 kernel: Key type dns_resolver registered Jul 12 00:24:12.069587 kernel: registered taskstats version 1 Jul 12 00:24:12.069603 kernel: Loading compiled-in X.509 certificates Jul 12 00:24:12.069620 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.186-flatcar: de2ee1d04443f96c763927c453375bbe23b5752a' Jul 12 00:24:12.069636 kernel: Key type .fscrypt registered Jul 12 00:24:12.069652 kernel: Key type fscrypt-provisioning registered Jul 12 00:24:12.069668 kernel: ima: No TPM chip found, activating TPM-bypass! Jul 12 00:24:12.069716 kernel: ima: Allocated hash algorithm: sha1 Jul 12 00:24:12.069740 kernel: ima: No architecture policies found Jul 12 00:24:12.069756 kernel: clk: Disabling unused clocks Jul 12 00:24:12.069772 kernel: Freeing unused kernel memory: 36416K Jul 12 00:24:12.069787 kernel: Run /init as init process Jul 12 00:24:12.069803 kernel: with arguments: Jul 12 00:24:12.069819 kernel: /init Jul 12 00:24:12.069835 kernel: with environment: Jul 12 00:24:12.069850 kernel: HOME=/ Jul 12 00:24:12.069866 kernel: TERM=linux Jul 12 00:24:12.069886 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jul 12 00:24:12.069908 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 12 00:24:12.069930 systemd[1]: Detected virtualization amazon. Jul 12 00:24:12.069948 systemd[1]: Detected architecture arm64. Jul 12 00:24:12.069965 systemd[1]: Running in initrd. Jul 12 00:24:12.069982 systemd[1]: No hostname configured, using default hostname. Jul 12 00:24:12.069998 systemd[1]: Hostname set to . Jul 12 00:24:12.070021 systemd[1]: Initializing machine ID from VM UUID. Jul 12 00:24:12.070038 systemd[1]: Queued start job for default target initrd.target. Jul 12 00:24:12.070055 systemd[1]: Started systemd-ask-password-console.path. Jul 12 00:24:12.070072 systemd[1]: Reached target cryptsetup.target. Jul 12 00:24:12.070089 systemd[1]: Reached target paths.target. Jul 12 00:24:12.070106 systemd[1]: Reached target slices.target. Jul 12 00:24:12.070123 systemd[1]: Reached target swap.target. Jul 12 00:24:12.070140 systemd[1]: Reached target timers.target. Jul 12 00:24:12.070162 systemd[1]: Listening on iscsid.socket. Jul 12 00:24:12.070179 systemd[1]: Listening on iscsiuio.socket. Jul 12 00:24:12.070197 systemd[1]: Listening on systemd-journald-audit.socket. Jul 12 00:24:12.070214 systemd[1]: Listening on systemd-journald-dev-log.socket. Jul 12 00:24:12.070231 systemd[1]: Listening on systemd-journald.socket. Jul 12 00:24:12.070249 systemd[1]: Listening on systemd-networkd.socket. Jul 12 00:24:12.070266 systemd[1]: Listening on systemd-udevd-control.socket. Jul 12 00:24:12.070284 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 12 00:24:12.070305 systemd[1]: Reached target sockets.target. Jul 12 00:24:12.070323 systemd[1]: Starting kmod-static-nodes.service... Jul 12 00:24:12.070340 systemd[1]: Finished network-cleanup.service. Jul 12 00:24:12.070357 systemd[1]: Starting systemd-fsck-usr.service... Jul 12 00:24:12.070374 systemd[1]: Starting systemd-journald.service... Jul 12 00:24:12.070391 systemd[1]: Starting systemd-modules-load.service... Jul 12 00:24:12.070409 systemd[1]: Starting systemd-resolved.service... Jul 12 00:24:12.070426 systemd[1]: Starting systemd-vconsole-setup.service... Jul 12 00:24:12.070444 systemd[1]: Finished kmod-static-nodes.service. Jul 12 00:24:12.070467 kernel: audit: type=1130 audit(1752279852.019:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:12.070486 systemd[1]: Finished systemd-fsck-usr.service. Jul 12 00:24:12.070504 kernel: audit: type=1130 audit(1752279852.033:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:12.070522 systemd[1]: Finished systemd-vconsole-setup.service. Jul 12 00:24:12.070539 systemd[1]: Starting dracut-cmdline-ask.service... Jul 12 00:24:12.070557 kernel: audit: type=1130 audit(1752279852.047:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:12.070575 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 12 00:24:12.070597 systemd-journald[310]: Journal started Jul 12 00:24:12.070732 systemd-journald[310]: Runtime Journal (/run/log/journal/ec2185f30fe9f812d85a9c8d0c21652d) is 8.0M, max 75.4M, 67.4M free. Jul 12 00:24:12.019000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:12.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:12.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:12.006778 systemd-modules-load[311]: Inserted module 'overlay' Jul 12 00:24:12.088150 systemd[1]: Started systemd-journald.service. Jul 12 00:24:12.106792 kernel: audit: type=1130 audit(1752279852.088:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:12.106865 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jul 12 00:24:12.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:12.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:12.119809 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 12 00:24:12.137714 kernel: audit: type=1130 audit(1752279852.118:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:12.139722 kernel: Bridge firewalling registered Jul 12 00:24:12.139744 systemd-modules-load[311]: Inserted module 'br_netfilter' Jul 12 00:24:12.157784 systemd-resolved[312]: Positive Trust Anchors: Jul 12 00:24:12.162094 systemd-resolved[312]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 12 00:24:12.168347 systemd-resolved[312]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 12 00:24:12.215886 kernel: SCSI subsystem initialized Jul 12 00:24:12.215933 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jul 12 00:24:12.215972 kernel: device-mapper: uevent: version 1.0.3 Jul 12 00:24:12.215999 kernel: audit: type=1130 audit(1752279852.195:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:12.216024 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Jul 12 00:24:12.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:12.168641 systemd[1]: Finished dracut-cmdline-ask.service. Jul 12 00:24:12.198351 systemd[1]: Starting dracut-cmdline.service... Jul 12 00:24:12.236220 systemd-modules-load[311]: Inserted module 'dm_multipath' Jul 12 00:24:12.237851 systemd[1]: Finished systemd-modules-load.service. Jul 12 00:24:12.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:12.255118 systemd[1]: Starting systemd-sysctl.service... Jul 12 00:24:12.262429 dracut-cmdline[326]: dracut-dracut-053 Jul 12 00:24:12.265234 kernel: audit: type=1130 audit(1752279852.238:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:12.274008 dracut-cmdline[326]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=6cb548cec1e3020e9c3dcbc1d7670f4d8bdc2e3c8e062898ccaed7fc9d588f65 Jul 12 00:24:12.298051 systemd[1]: Finished systemd-sysctl.service. Jul 12 00:24:12.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:12.310737 kernel: audit: type=1130 audit(1752279852.298:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:12.428735 kernel: Loading iSCSI transport class v2.0-870. Jul 12 00:24:12.447727 kernel: iscsi: registered transport (tcp) Jul 12 00:24:12.477030 kernel: iscsi: registered transport (qla4xxx) Jul 12 00:24:12.477102 kernel: QLogic iSCSI HBA Driver Jul 12 00:24:12.622595 systemd-resolved[312]: Defaulting to hostname 'linux'. Jul 12 00:24:12.625173 kernel: random: crng init done Jul 12 00:24:12.626505 systemd[1]: Started systemd-resolved.service. Jul 12 00:24:12.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:12.638034 systemd[1]: Reached target nss-lookup.target. Jul 12 00:24:12.642735 kernel: audit: type=1130 audit(1752279852.627:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:12.664890 systemd[1]: Finished dracut-cmdline.service. Jul 12 00:24:12.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:12.670354 systemd[1]: Starting dracut-pre-udev.service... Jul 12 00:24:12.743737 kernel: raid6: neonx8 gen() 6402 MB/s Jul 12 00:24:12.761728 kernel: raid6: neonx8 xor() 4735 MB/s Jul 12 00:24:12.779733 kernel: raid6: neonx4 gen() 6508 MB/s Jul 12 00:24:12.797734 kernel: raid6: neonx4 xor() 4922 MB/s Jul 12 00:24:12.815735 kernel: raid6: neonx2 gen() 5739 MB/s Jul 12 00:24:12.833739 kernel: raid6: neonx2 xor() 4521 MB/s Jul 12 00:24:12.851735 kernel: raid6: neonx1 gen() 4451 MB/s Jul 12 00:24:12.869730 kernel: raid6: neonx1 xor() 3659 MB/s Jul 12 00:24:12.887731 kernel: raid6: int64x8 gen() 3410 MB/s Jul 12 00:24:12.905729 kernel: raid6: int64x8 xor() 2070 MB/s Jul 12 00:24:12.923730 kernel: raid6: int64x4 gen() 3810 MB/s Jul 12 00:24:12.941732 kernel: raid6: int64x4 xor() 2187 MB/s Jul 12 00:24:12.959722 kernel: raid6: int64x2 gen() 3588 MB/s Jul 12 00:24:12.977729 kernel: raid6: int64x2 xor() 1951 MB/s Jul 12 00:24:12.995732 kernel: raid6: int64x1 gen() 2745 MB/s Jul 12 00:24:13.015391 kernel: raid6: int64x1 xor() 1443 MB/s Jul 12 00:24:13.015457 kernel: raid6: using algorithm neonx4 gen() 6508 MB/s Jul 12 00:24:13.015482 kernel: raid6: .... xor() 4922 MB/s, rmw enabled Jul 12 00:24:13.017291 kernel: raid6: using neon recovery algorithm Jul 12 00:24:13.036747 kernel: xor: measuring software checksum speed Jul 12 00:24:13.038719 kernel: 8regs : 8412 MB/sec Jul 12 00:24:13.040724 kernel: 32regs : 10384 MB/sec Jul 12 00:24:13.044385 kernel: arm64_neon : 8544 MB/sec Jul 12 00:24:13.044453 kernel: xor: using function: 32regs (10384 MB/sec) Jul 12 00:24:13.143734 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Jul 12 00:24:13.163700 systemd[1]: Finished dracut-pre-udev.service. Jul 12 00:24:13.162000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:13.167000 audit: BPF prog-id=7 op=LOAD Jul 12 00:24:13.171000 audit: BPF prog-id=8 op=LOAD Jul 12 00:24:13.173072 systemd[1]: Starting systemd-udevd.service... Jul 12 00:24:13.203313 systemd-udevd[509]: Using default interface naming scheme 'v252'. Jul 12 00:24:13.214819 systemd[1]: Started systemd-udevd.service. Jul 12 00:24:13.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:13.222570 systemd[1]: Starting dracut-pre-trigger.service... Jul 12 00:24:13.254821 dracut-pre-trigger[512]: rd.md=0: removing MD RAID activation Jul 12 00:24:13.319369 systemd[1]: Finished dracut-pre-trigger.service. Jul 12 00:24:13.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:13.327119 systemd[1]: Starting systemd-udev-trigger.service... Jul 12 00:24:13.424790 systemd[1]: Finished systemd-udev-trigger.service. Jul 12 00:24:13.430000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:13.568297 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Jul 12 00:24:13.568399 kernel: ena 0000:00:05.0: enabling device (0010 -> 0012) Jul 12 00:24:13.595832 kernel: ACPI: \_SB_.PCI0.GSI0: Enabled at IRQ 35 Jul 12 00:24:13.595868 kernel: ena 0000:00:05.0: ENA device version: 0.10 Jul 12 00:24:13.596160 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Jul 12 00:24:13.596392 kernel: nvme nvme0: pci function 0000:00:04.0 Jul 12 00:24:13.596651 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem 80114000, mac addr 06:11:85:cc:5f:a5 Jul 12 00:24:13.601732 kernel: nvme nvme0: 2/0/0 default/read/poll queues Jul 12 00:24:13.609604 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Jul 12 00:24:13.609716 kernel: GPT:9289727 != 16777215 Jul 12 00:24:13.609750 kernel: GPT:Alternate GPT header not at the end of the disk. Jul 12 00:24:13.613461 kernel: GPT:9289727 != 16777215 Jul 12 00:24:13.613533 kernel: GPT: Use GNU Parted to correct GPT errors. Jul 12 00:24:13.615507 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Jul 12 00:24:13.622732 (udev-worker)[551]: Network interface NamePolicy= disabled on kernel command line. Jul 12 00:24:13.694732 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/nvme0n1p6 scanned by (udev-worker) (562) Jul 12 00:24:13.753824 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Jul 12 00:24:13.801153 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Jul 12 00:24:13.842519 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 12 00:24:13.857150 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Jul 12 00:24:13.859667 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Jul 12 00:24:13.867886 systemd[1]: Starting disk-uuid.service... Jul 12 00:24:13.880837 disk-uuid[660]: Primary Header is updated. Jul 12 00:24:13.880837 disk-uuid[660]: Secondary Entries is updated. Jul 12 00:24:13.880837 disk-uuid[660]: Secondary Header is updated. Jul 12 00:24:13.893070 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Jul 12 00:24:14.914756 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Jul 12 00:24:14.915398 disk-uuid[661]: The operation has completed successfully. Jul 12 00:24:15.090969 systemd[1]: disk-uuid.service: Deactivated successfully. Jul 12 00:24:15.093623 systemd[1]: Finished disk-uuid.service. Jul 12 00:24:15.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:15.096000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:15.128106 systemd[1]: Starting verity-setup.service... Jul 12 00:24:15.165752 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Jul 12 00:24:15.259435 systemd[1]: Found device dev-mapper-usr.device. Jul 12 00:24:15.265782 systemd[1]: Mounting sysusr-usr.mount... Jul 12 00:24:15.273229 systemd[1]: Finished verity-setup.service. Jul 12 00:24:15.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:15.365749 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 12 00:24:15.366559 systemd[1]: Mounted sysusr-usr.mount. Jul 12 00:24:15.370500 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Jul 12 00:24:15.375165 systemd[1]: Starting ignition-setup.service... Jul 12 00:24:15.380828 systemd[1]: Starting parse-ip-for-networkd.service... Jul 12 00:24:15.419786 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Jul 12 00:24:15.419859 kernel: BTRFS info (device nvme0n1p6): using free space tree Jul 12 00:24:15.422139 kernel: BTRFS info (device nvme0n1p6): has skinny extents Jul 12 00:24:15.433738 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Jul 12 00:24:15.453768 systemd[1]: mnt-oem.mount: Deactivated successfully. Jul 12 00:24:15.475019 systemd[1]: Finished ignition-setup.service. Jul 12 00:24:15.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:15.481007 systemd[1]: Starting ignition-fetch-offline.service... Jul 12 00:24:15.557568 systemd[1]: Finished parse-ip-for-networkd.service. Jul 12 00:24:15.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:15.561000 audit: BPF prog-id=9 op=LOAD Jul 12 00:24:15.564450 systemd[1]: Starting systemd-networkd.service... Jul 12 00:24:15.620179 systemd-networkd[1101]: lo: Link UP Jul 12 00:24:15.620206 systemd-networkd[1101]: lo: Gained carrier Jul 12 00:24:15.624952 systemd-networkd[1101]: Enumeration completed Jul 12 00:24:15.626500 systemd-networkd[1101]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 12 00:24:15.638000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:15.630885 systemd[1]: Started systemd-networkd.service. Jul 12 00:24:15.642602 systemd[1]: Reached target network.target. Jul 12 00:24:15.646468 systemd-networkd[1101]: eth0: Link UP Jul 12 00:24:15.647197 systemd-networkd[1101]: eth0: Gained carrier Jul 12 00:24:15.650268 systemd[1]: Starting iscsiuio.service... Jul 12 00:24:15.671918 systemd-networkd[1101]: eth0: DHCPv4 address 172.31.26.167/20, gateway 172.31.16.1 acquired from 172.31.16.1 Jul 12 00:24:15.694425 kernel: kauditd_printk_skb: 14 callbacks suppressed Jul 12 00:24:15.694519 kernel: audit: type=1130 audit(1752279855.683:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:15.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:15.681855 systemd[1]: Started iscsiuio.service. Jul 12 00:24:15.688671 systemd[1]: Starting iscsid.service... Jul 12 00:24:15.702920 iscsid[1106]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jul 12 00:24:15.702920 iscsid[1106]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jul 12 00:24:15.702920 iscsid[1106]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jul 12 00:24:15.702920 iscsid[1106]: If using hardware iscsi like qla4xxx this message can be ignored. Jul 12 00:24:15.702920 iscsid[1106]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jul 12 00:24:15.728492 iscsid[1106]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jul 12 00:24:15.737127 systemd[1]: Started iscsid.service. Jul 12 00:24:15.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:15.749082 systemd[1]: Starting dracut-initqueue.service... Jul 12 00:24:15.754738 kernel: audit: type=1130 audit(1752279855.737:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:15.778740 systemd[1]: Finished dracut-initqueue.service. Jul 12 00:24:15.783431 systemd[1]: Reached target remote-fs-pre.target. Jul 12 00:24:15.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:15.784043 systemd[1]: Reached target remote-cryptsetup.target. Jul 12 00:24:15.797372 systemd[1]: Reached target remote-fs.target. Jul 12 00:24:15.803400 kernel: audit: type=1130 audit(1752279855.781:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:15.804916 systemd[1]: Starting dracut-pre-mount.service... Jul 12 00:24:15.828745 systemd[1]: Finished dracut-pre-mount.service. Jul 12 00:24:15.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:15.841842 kernel: audit: type=1130 audit(1752279855.831:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:16.274591 ignition[1041]: Ignition 2.14.0 Jul 12 00:24:16.276362 ignition[1041]: Stage: fetch-offline Jul 12 00:24:16.277111 ignition[1041]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 12 00:24:16.277319 ignition[1041]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Jul 12 00:24:16.304874 ignition[1041]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Jul 12 00:24:16.308194 ignition[1041]: Ignition finished successfully Jul 12 00:24:16.311375 systemd[1]: Finished ignition-fetch-offline.service. Jul 12 00:24:16.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:16.324842 kernel: audit: type=1130 audit(1752279856.312:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:16.315608 systemd[1]: Starting ignition-fetch.service... Jul 12 00:24:16.337523 ignition[1125]: Ignition 2.14.0 Jul 12 00:24:16.337557 ignition[1125]: Stage: fetch Jul 12 00:24:16.337998 ignition[1125]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 12 00:24:16.338065 ignition[1125]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Jul 12 00:24:16.356406 ignition[1125]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Jul 12 00:24:16.359112 ignition[1125]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Jul 12 00:24:16.368547 ignition[1125]: INFO : PUT result: OK Jul 12 00:24:16.373407 ignition[1125]: DEBUG : parsed url from cmdline: "" Jul 12 00:24:16.376541 ignition[1125]: INFO : no config URL provided Jul 12 00:24:16.376541 ignition[1125]: INFO : reading system config file "/usr/lib/ignition/user.ign" Jul 12 00:24:16.376541 ignition[1125]: INFO : no config at "/usr/lib/ignition/user.ign" Jul 12 00:24:16.376541 ignition[1125]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Jul 12 00:24:16.387960 ignition[1125]: INFO : PUT result: OK Jul 12 00:24:16.390747 ignition[1125]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Jul 12 00:24:16.394299 ignition[1125]: INFO : GET result: OK Jul 12 00:24:16.396873 ignition[1125]: DEBUG : parsing config with SHA512: 95e5661d9ccf1e159a92093884bd5c8f112a093203e92f4305ecb253fa19aede64b1e3c535066b34bece4777841f9c89edc6a109044042e1ba5e2bae44ff6cbb Jul 12 00:24:16.412042 unknown[1125]: fetched base config from "system" Jul 12 00:24:16.414547 unknown[1125]: fetched base config from "system" Jul 12 00:24:16.414565 unknown[1125]: fetched user config from "aws" Jul 12 00:24:16.420421 ignition[1125]: fetch: fetch complete Jul 12 00:24:16.420458 ignition[1125]: fetch: fetch passed Jul 12 00:24:16.420616 ignition[1125]: Ignition finished successfully Jul 12 00:24:16.427330 systemd[1]: Finished ignition-fetch.service. Jul 12 00:24:16.430000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:16.433818 systemd[1]: Starting ignition-kargs.service... Jul 12 00:24:16.444944 kernel: audit: type=1130 audit(1752279856.430:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:16.458589 ignition[1131]: Ignition 2.14.0 Jul 12 00:24:16.458620 ignition[1131]: Stage: kargs Jul 12 00:24:16.458995 ignition[1131]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 12 00:24:16.459058 ignition[1131]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Jul 12 00:24:16.475287 ignition[1131]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Jul 12 00:24:16.480019 ignition[1131]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Jul 12 00:24:16.482852 ignition[1131]: INFO : PUT result: OK Jul 12 00:24:16.488062 ignition[1131]: kargs: kargs passed Jul 12 00:24:16.488206 ignition[1131]: Ignition finished successfully Jul 12 00:24:16.491227 systemd[1]: Finished ignition-kargs.service. Jul 12 00:24:16.509910 kernel: audit: type=1130 audit(1752279856.495:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:16.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:16.505700 systemd[1]: Starting ignition-disks.service... Jul 12 00:24:16.526952 ignition[1137]: Ignition 2.14.0 Jul 12 00:24:16.529280 ignition[1137]: Stage: disks Jul 12 00:24:16.529760 ignition[1137]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 12 00:24:16.529832 ignition[1137]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Jul 12 00:24:16.545876 ignition[1137]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Jul 12 00:24:16.548891 ignition[1137]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Jul 12 00:24:16.552421 ignition[1137]: INFO : PUT result: OK Jul 12 00:24:16.558123 ignition[1137]: disks: disks passed Jul 12 00:24:16.558262 ignition[1137]: Ignition finished successfully Jul 12 00:24:16.562868 systemd[1]: Finished ignition-disks.service. Jul 12 00:24:16.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:16.576033 systemd[1]: Reached target initrd-root-device.target. Jul 12 00:24:16.584477 kernel: audit: type=1130 audit(1752279856.569:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:16.580956 systemd[1]: Reached target local-fs-pre.target. Jul 12 00:24:16.584091 systemd[1]: Reached target local-fs.target. Jul 12 00:24:16.587719 systemd[1]: Reached target sysinit.target. Jul 12 00:24:16.591244 systemd[1]: Reached target basic.target. Jul 12 00:24:16.599386 systemd[1]: Starting systemd-fsck-root.service... Jul 12 00:24:16.644086 systemd-fsck[1145]: ROOT: clean, 619/553520 files, 56022/553472 blocks Jul 12 00:24:16.655493 systemd[1]: Finished systemd-fsck-root.service. Jul 12 00:24:16.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:16.671743 kernel: audit: type=1130 audit(1752279856.659:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:16.672860 systemd[1]: Mounting sysroot.mount... Jul 12 00:24:16.701110 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 12 00:24:16.704851 systemd[1]: Mounted sysroot.mount. Jul 12 00:24:16.714334 systemd[1]: Reached target initrd-root-fs.target. Jul 12 00:24:16.721821 systemd[1]: Mounting sysroot-usr.mount... Jul 12 00:24:16.728832 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Jul 12 00:24:16.730963 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jul 12 00:24:16.731025 systemd[1]: Reached target ignition-diskful.target. Jul 12 00:24:16.737472 systemd[1]: Mounted sysroot-usr.mount. Jul 12 00:24:16.763655 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 12 00:24:16.775744 systemd[1]: Starting initrd-setup-root.service... Jul 12 00:24:16.789780 initrd-setup-root[1167]: cut: /sysroot/etc/passwd: No such file or directory Jul 12 00:24:16.807953 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/nvme0n1p6 scanned by mount (1162) Jul 12 00:24:16.812293 initrd-setup-root[1175]: cut: /sysroot/etc/group: No such file or directory Jul 12 00:24:16.819861 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Jul 12 00:24:16.819903 kernel: BTRFS info (device nvme0n1p6): using free space tree Jul 12 00:24:16.819927 kernel: BTRFS info (device nvme0n1p6): has skinny extents Jul 12 00:24:16.823734 initrd-setup-root[1186]: cut: /sysroot/etc/shadow: No such file or directory Jul 12 00:24:16.836463 initrd-setup-root[1207]: cut: /sysroot/etc/gshadow: No such file or directory Jul 12 00:24:16.843722 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Jul 12 00:24:16.851029 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 12 00:24:16.910994 systemd-networkd[1101]: eth0: Gained IPv6LL Jul 12 00:24:17.031192 systemd[1]: Finished initrd-setup-root.service. Jul 12 00:24:17.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:17.036506 systemd[1]: Starting ignition-mount.service... Jul 12 00:24:17.059203 kernel: audit: type=1130 audit(1752279857.030:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:17.053118 systemd[1]: Starting sysroot-boot.service... Jul 12 00:24:17.062889 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Jul 12 00:24:17.065167 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Jul 12 00:24:17.087637 ignition[1227]: INFO : Ignition 2.14.0 Jul 12 00:24:17.094054 ignition[1227]: INFO : Stage: mount Jul 12 00:24:17.094054 ignition[1227]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 12 00:24:17.094054 ignition[1227]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Jul 12 00:24:17.113535 ignition[1227]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Jul 12 00:24:17.116976 ignition[1227]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Jul 12 00:24:17.121422 ignition[1227]: INFO : PUT result: OK Jul 12 00:24:17.126849 ignition[1227]: INFO : mount: mount passed Jul 12 00:24:17.128786 ignition[1227]: INFO : Ignition finished successfully Jul 12 00:24:17.133429 systemd[1]: Finished ignition-mount.service. Jul 12 00:24:17.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:17.138142 systemd[1]: Starting ignition-files.service... Jul 12 00:24:17.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:17.150637 systemd[1]: Finished sysroot-boot.service. Jul 12 00:24:17.160848 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 12 00:24:17.184738 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by mount (1237) Jul 12 00:24:17.191177 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Jul 12 00:24:17.191236 kernel: BTRFS info (device nvme0n1p6): using free space tree Jul 12 00:24:17.191260 kernel: BTRFS info (device nvme0n1p6): has skinny extents Jul 12 00:24:17.200725 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Jul 12 00:24:17.206052 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 12 00:24:17.226917 ignition[1256]: INFO : Ignition 2.14.0 Jul 12 00:24:17.228830 ignition[1256]: INFO : Stage: files Jul 12 00:24:17.228830 ignition[1256]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 12 00:24:17.228830 ignition[1256]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Jul 12 00:24:17.247092 ignition[1256]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Jul 12 00:24:17.249788 ignition[1256]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Jul 12 00:24:17.253561 ignition[1256]: INFO : PUT result: OK Jul 12 00:24:17.259590 ignition[1256]: DEBUG : files: compiled without relabeling support, skipping Jul 12 00:24:17.265568 ignition[1256]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jul 12 00:24:17.265568 ignition[1256]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jul 12 00:24:17.310951 ignition[1256]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jul 12 00:24:17.314220 ignition[1256]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jul 12 00:24:17.317545 unknown[1256]: wrote ssh authorized keys file for user: core Jul 12 00:24:17.320462 ignition[1256]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jul 12 00:24:17.324563 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Jul 12 00:24:17.328772 ignition[1256]: INFO : GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 Jul 12 00:24:17.438870 ignition[1256]: INFO : GET result: OK Jul 12 00:24:17.661087 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Jul 12 00:24:17.661087 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Jul 12 00:24:17.670488 ignition[1256]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Jul 12 00:24:17.680509 ignition[1256]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2073294312" Jul 12 00:24:17.683773 ignition[1256]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2073294312": device or resource busy Jul 12 00:24:17.683773 ignition[1256]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2073294312", trying btrfs: device or resource busy Jul 12 00:24:17.683773 ignition[1256]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2073294312" Jul 12 00:24:17.696176 ignition[1256]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2073294312" Jul 12 00:24:17.701115 ignition[1256]: INFO : op(3): [started] unmounting "/mnt/oem2073294312" Jul 12 00:24:17.706721 ignition[1256]: INFO : op(3): [finished] unmounting "/mnt/oem2073294312" Jul 12 00:24:17.706721 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Jul 12 00:24:17.706721 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/install.sh" Jul 12 00:24:17.706721 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/install.sh" Jul 12 00:24:17.706721 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nginx.yaml" Jul 12 00:24:17.706721 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nginx.yaml" Jul 12 00:24:17.706721 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Jul 12 00:24:17.706721 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Jul 12 00:24:17.706721 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Jul 12 00:24:17.706721 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Jul 12 00:24:17.764308 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Jul 12 00:24:17.764308 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jul 12 00:24:17.764308 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-arm64.raw" Jul 12 00:24:17.764308 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-arm64.raw" Jul 12 00:24:17.764308 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Jul 12 00:24:17.764308 ignition[1256]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Jul 12 00:24:17.764308 ignition[1256]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1823073871" Jul 12 00:24:17.764308 ignition[1256]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1823073871": device or resource busy Jul 12 00:24:17.764308 ignition[1256]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1823073871", trying btrfs: device or resource busy Jul 12 00:24:17.764308 ignition[1256]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1823073871" Jul 12 00:24:17.764308 ignition[1256]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1823073871" Jul 12 00:24:17.764308 ignition[1256]: INFO : op(6): [started] unmounting "/mnt/oem1823073871" Jul 12 00:24:17.764308 ignition[1256]: INFO : op(6): [finished] unmounting "/mnt/oem1823073871" Jul 12 00:24:17.764308 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Jul 12 00:24:17.764308 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Jul 12 00:24:17.764308 ignition[1256]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Jul 12 00:24:17.764308 ignition[1256]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem672124045" Jul 12 00:24:17.764308 ignition[1256]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem672124045": device or resource busy Jul 12 00:24:17.836567 ignition[1256]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem672124045", trying btrfs: device or resource busy Jul 12 00:24:17.836567 ignition[1256]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem672124045" Jul 12 00:24:17.836567 ignition[1256]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem672124045" Jul 12 00:24:17.836567 ignition[1256]: INFO : op(9): [started] unmounting "/mnt/oem672124045" Jul 12 00:24:17.836567 ignition[1256]: INFO : op(9): [finished] unmounting "/mnt/oem672124045" Jul 12 00:24:17.836567 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Jul 12 00:24:17.836567 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Jul 12 00:24:17.836567 ignition[1256]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Jul 12 00:24:17.836567 ignition[1256]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2901767213" Jul 12 00:24:17.836567 ignition[1256]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2901767213": device or resource busy Jul 12 00:24:17.836567 ignition[1256]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2901767213", trying btrfs: device or resource busy Jul 12 00:24:17.836567 ignition[1256]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2901767213" Jul 12 00:24:17.836567 ignition[1256]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2901767213" Jul 12 00:24:17.836567 ignition[1256]: INFO : op(c): [started] unmounting "/mnt/oem2901767213" Jul 12 00:24:17.836567 ignition[1256]: INFO : op(c): [finished] unmounting "/mnt/oem2901767213" Jul 12 00:24:17.836567 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Jul 12 00:24:17.836567 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-arm64.raw" Jul 12 00:24:17.836567 ignition[1256]: INFO : GET https://extensions.flatcar.org/extensions/kubernetes-v1.31.8-arm64.raw: attempt #1 Jul 12 00:24:18.409934 ignition[1256]: INFO : GET result: OK Jul 12 00:24:19.012514 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-arm64.raw" Jul 12 00:24:19.017353 ignition[1256]: INFO : files: op(f): [started] processing unit "amazon-ssm-agent.service" Jul 12 00:24:19.017353 ignition[1256]: INFO : files: op(f): op(10): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Jul 12 00:24:19.030363 ignition[1256]: INFO : files: op(f): op(10): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Jul 12 00:24:19.030363 ignition[1256]: INFO : files: op(f): [finished] processing unit "amazon-ssm-agent.service" Jul 12 00:24:19.030363 ignition[1256]: INFO : files: op(11): [started] processing unit "nvidia.service" Jul 12 00:24:19.030363 ignition[1256]: INFO : files: op(11): [finished] processing unit "nvidia.service" Jul 12 00:24:19.030363 ignition[1256]: INFO : files: op(12): [started] processing unit "coreos-metadata-sshkeys@.service" Jul 12 00:24:19.030363 ignition[1256]: INFO : files: op(12): [finished] processing unit "coreos-metadata-sshkeys@.service" Jul 12 00:24:19.030363 ignition[1256]: INFO : files: op(13): [started] processing unit "prepare-helm.service" Jul 12 00:24:19.030363 ignition[1256]: INFO : files: op(13): op(14): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Jul 12 00:24:19.030363 ignition[1256]: INFO : files: op(13): op(14): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Jul 12 00:24:19.030363 ignition[1256]: INFO : files: op(13): [finished] processing unit "prepare-helm.service" Jul 12 00:24:19.030363 ignition[1256]: INFO : files: op(15): [started] setting preset to enabled for "amazon-ssm-agent.service" Jul 12 00:24:19.030363 ignition[1256]: INFO : files: op(15): [finished] setting preset to enabled for "amazon-ssm-agent.service" Jul 12 00:24:19.030363 ignition[1256]: INFO : files: op(16): [started] setting preset to enabled for "nvidia.service" Jul 12 00:24:19.030363 ignition[1256]: INFO : files: op(16): [finished] setting preset to enabled for "nvidia.service" Jul 12 00:24:19.030363 ignition[1256]: INFO : files: op(17): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Jul 12 00:24:19.030363 ignition[1256]: INFO : files: op(17): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Jul 12 00:24:19.030363 ignition[1256]: INFO : files: op(18): [started] setting preset to enabled for "prepare-helm.service" Jul 12 00:24:19.030363 ignition[1256]: INFO : files: op(18): [finished] setting preset to enabled for "prepare-helm.service" Jul 12 00:24:19.030363 ignition[1256]: INFO : files: createResultFile: createFiles: op(19): [started] writing file "/sysroot/etc/.ignition-result.json" Jul 12 00:24:19.030363 ignition[1256]: INFO : files: createResultFile: createFiles: op(19): [finished] writing file "/sysroot/etc/.ignition-result.json" Jul 12 00:24:19.030363 ignition[1256]: INFO : files: files passed Jul 12 00:24:19.030363 ignition[1256]: INFO : Ignition finished successfully Jul 12 00:24:19.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:19.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:19.119000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:19.033756 systemd[1]: Finished ignition-files.service. Jul 12 00:24:19.047206 systemd[1]: Starting initrd-setup-root-after-ignition.service... Jul 12 00:24:19.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:19.063214 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Jul 12 00:24:19.141057 initrd-setup-root-after-ignition[1281]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jul 12 00:24:19.064809 systemd[1]: Starting ignition-quench.service... Jul 12 00:24:19.095163 systemd[1]: ignition-quench.service: Deactivated successfully. Jul 12 00:24:19.095437 systemd[1]: Finished ignition-quench.service. Jul 12 00:24:19.131323 systemd[1]: Finished initrd-setup-root-after-ignition.service. Jul 12 00:24:19.135592 systemd[1]: Reached target ignition-complete.target. Jul 12 00:24:19.142946 systemd[1]: Starting initrd-parse-etc.service... Jul 12 00:24:19.188311 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jul 12 00:24:19.188904 systemd[1]: Finished initrd-parse-etc.service. Jul 12 00:24:19.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:19.191000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:19.193841 systemd[1]: Reached target initrd-fs.target. Jul 12 00:24:19.197346 systemd[1]: Reached target initrd.target. Jul 12 00:24:19.200763 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Jul 12 00:24:19.202395 systemd[1]: Starting dracut-pre-pivot.service... Jul 12 00:24:19.233031 systemd[1]: Finished dracut-pre-pivot.service. Jul 12 00:24:19.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:19.235071 systemd[1]: Starting initrd-cleanup.service... Jul 12 00:24:19.255589 systemd[1]: Stopped target nss-lookup.target. Jul 12 00:24:19.264148 systemd[1]: Stopped target remote-cryptsetup.target. Jul 12 00:24:19.267812 systemd[1]: Stopped target timers.target. Jul 12 00:24:19.271279 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jul 12 00:24:19.272000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:19.271516 systemd[1]: Stopped dracut-pre-pivot.service. Jul 12 00:24:19.274746 systemd[1]: Stopped target initrd.target. Jul 12 00:24:19.282722 systemd[1]: Stopped target basic.target. Jul 12 00:24:19.283129 systemd[1]: Stopped target ignition-complete.target. Jul 12 00:24:19.286467 systemd[1]: Stopped target ignition-diskful.target. Jul 12 00:24:19.290009 systemd[1]: Stopped target initrd-root-device.target. Jul 12 00:24:19.293523 systemd[1]: Stopped target remote-fs.target. Jul 12 00:24:19.297564 systemd[1]: Stopped target remote-fs-pre.target. Jul 12 00:24:19.301423 systemd[1]: Stopped target sysinit.target. Jul 12 00:24:19.305219 systemd[1]: Stopped target local-fs.target. Jul 12 00:24:19.308489 systemd[1]: Stopped target local-fs-pre.target. Jul 12 00:24:19.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:19.311909 systemd[1]: Stopped target swap.target. Jul 12 00:24:19.315247 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jul 12 00:24:19.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:19.315499 systemd[1]: Stopped dracut-pre-mount.service. Jul 12 00:24:19.328000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:19.318869 systemd[1]: Stopped target cryptsetup.target. Jul 12 00:24:19.332000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:19.322242 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jul 12 00:24:19.322468 systemd[1]: Stopped dracut-initqueue.service. Jul 12 00:24:19.325889 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jul 12 00:24:19.326128 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Jul 12 00:24:19.330000 systemd[1]: ignition-files.service: Deactivated successfully. Jul 12 00:24:19.330222 systemd[1]: Stopped ignition-files.service. Jul 12 00:24:19.335764 systemd[1]: Stopping ignition-mount.service... Jul 12 00:24:19.360436 systemd[1]: Stopping sysroot-boot.service... Jul 12 00:24:19.362923 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jul 12 00:24:19.364387 systemd[1]: Stopped systemd-udev-trigger.service. Jul 12 00:24:19.369000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:19.371445 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jul 12 00:24:19.372000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:19.371783 systemd[1]: Stopped dracut-pre-trigger.service. Jul 12 00:24:19.385190 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jul 12 00:24:19.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:19.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:19.385405 systemd[1]: Finished initrd-cleanup.service. Jul 12 00:24:19.403184 ignition[1294]: INFO : Ignition 2.14.0 Jul 12 00:24:19.403184 ignition[1294]: INFO : Stage: umount Jul 12 00:24:19.406917 ignition[1294]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 12 00:24:19.406917 ignition[1294]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Jul 12 00:24:19.422880 ignition[1294]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Jul 12 00:24:19.426030 ignition[1294]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Jul 12 00:24:19.432023 ignition[1294]: INFO : PUT result: OK Jul 12 00:24:19.430979 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jul 12 00:24:19.444879 ignition[1294]: INFO : umount: umount passed Jul 12 00:24:19.446893 ignition[1294]: INFO : Ignition finished successfully Jul 12 00:24:19.450763 systemd[1]: ignition-mount.service: Deactivated successfully. Jul 12 00:24:19.452037 systemd[1]: Stopped ignition-mount.service. Jul 12 00:24:19.456000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:19.458858 systemd[1]: ignition-disks.service: Deactivated successfully. Jul 12 00:24:19.458976 systemd[1]: Stopped ignition-disks.service. Jul 12 00:24:19.461000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:19.463042 systemd[1]: ignition-kargs.service: Deactivated successfully. Jul 12 00:24:19.464000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:19.463135 systemd[1]: Stopped ignition-kargs.service. Jul 12 00:24:19.468000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:19.466337 systemd[1]: ignition-fetch.service: Deactivated successfully. Jul 12 00:24:19.466421 systemd[1]: Stopped ignition-fetch.service. Jul 12 00:24:19.475000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:19.470123 systemd[1]: Stopped target network.target. Jul 12 00:24:19.473311 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jul 12 00:24:19.473409 systemd[1]: Stopped ignition-fetch-offline.service. Jul 12 00:24:19.477174 systemd[1]: Stopped target paths.target. Jul 12 00:24:19.480401 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jul 12 00:24:19.484805 systemd[1]: Stopped systemd-ask-password-console.path. Jul 12 00:24:19.488989 systemd[1]: Stopped target slices.target. Jul 12 00:24:19.492336 systemd[1]: Stopped target sockets.target. Jul 12 00:24:19.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:19.495819 systemd[1]: iscsid.socket: Deactivated successfully. Jul 12 00:24:19.495885 systemd[1]: Closed iscsid.socket. Jul 12 00:24:19.499723 systemd[1]: iscsiuio.socket: Deactivated successfully. Jul 12 00:24:19.519000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:19.499791 systemd[1]: Closed iscsiuio.socket. Jul 12 00:24:19.503050 systemd[1]: ignition-setup.service: Deactivated successfully. Jul 12 00:24:19.526000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:19.503168 systemd[1]: Stopped ignition-setup.service. Jul 12 00:24:19.506699 systemd[1]: Stopping systemd-networkd.service... Jul 12 00:24:19.510046 systemd[1]: Stopping systemd-resolved.service... Jul 12 00:24:19.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:19.536000 audit: BPF prog-id=6 op=UNLOAD Jul 12 00:24:19.514964 systemd[1]: sysroot-boot.service: Deactivated successfully. Jul 12 00:24:19.515172 systemd[1]: Stopped sysroot-boot.service. Jul 12 00:24:19.516554 systemd-networkd[1101]: eth0: DHCPv6 lease lost Jul 12 00:24:19.524204 systemd[1]: systemd-resolved.service: Deactivated successfully. Jul 12 00:24:19.526544 systemd[1]: Stopped systemd-resolved.service. Jul 12 00:24:19.530899 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 12 00:24:19.531127 systemd[1]: Stopped systemd-networkd.service. Jul 12 00:24:19.540165 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jul 12 00:24:19.540235 systemd[1]: Closed systemd-networkd.socket. Jul 12 00:24:19.540000 audit: BPF prog-id=9 op=UNLOAD Jul 12 00:24:19.557657 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jul 12 00:24:19.557888 systemd[1]: Stopped initrd-setup-root.service. Jul 12 00:24:19.559000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:19.564646 systemd[1]: Stopping network-cleanup.service... Jul 12 00:24:19.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:19.572000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:19.568824 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jul 12 00:24:19.573000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:19.568968 systemd[1]: Stopped parse-ip-for-networkd.service. Jul 12 00:24:19.572450 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jul 12 00:24:19.572537 systemd[1]: Stopped systemd-sysctl.service. Jul 12 00:24:19.574571 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jul 12 00:24:19.574656 systemd[1]: Stopped systemd-modules-load.service. Jul 12 00:24:19.575435 systemd[1]: Stopping systemd-udevd.service... Jul 12 00:24:19.587615 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jul 12 00:24:19.611315 systemd[1]: systemd-udevd.service: Deactivated successfully. Jul 12 00:24:19.612000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:19.611636 systemd[1]: Stopped systemd-udevd.service. Jul 12 00:24:19.615000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:19.615728 systemd[1]: network-cleanup.service: Deactivated successfully. Jul 12 00:24:19.615933 systemd[1]: Stopped network-cleanup.service. Jul 12 00:24:19.617958 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jul 12 00:24:19.626000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:19.618041 systemd[1]: Closed systemd-udevd-control.socket. Jul 12 00:24:19.630000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:19.620848 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jul 12 00:24:19.633000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:19.620918 systemd[1]: Closed systemd-udevd-kernel.socket. Jul 12 00:24:19.624566 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jul 12 00:24:19.624661 systemd[1]: Stopped dracut-pre-udev.service. Jul 12 00:24:19.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:19.628111 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jul 12 00:24:19.654000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:19.628205 systemd[1]: Stopped dracut-cmdline.service. Jul 12 00:24:19.659000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:19.632131 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jul 12 00:24:19.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:19.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:19.632219 systemd[1]: Stopped dracut-cmdline-ask.service. Jul 12 00:24:19.637154 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Jul 12 00:24:19.648358 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Jul 12 00:24:19.648477 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Jul 12 00:24:19.652766 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jul 12 00:24:19.652883 systemd[1]: Stopped kmod-static-nodes.service. Jul 12 00:24:19.656612 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jul 12 00:24:19.656774 systemd[1]: Stopped systemd-vconsole-setup.service. Jul 12 00:24:19.662879 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Jul 12 00:24:19.663968 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jul 12 00:24:19.664202 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Jul 12 00:24:19.667414 systemd[1]: Reached target initrd-switch-root.target. Jul 12 00:24:19.672985 systemd[1]: Starting initrd-switch-root.service... Jul 12 00:24:19.701792 systemd[1]: Switching root. Jul 12 00:24:19.741121 iscsid[1106]: iscsid shutting down. Jul 12 00:24:19.748914 systemd-journald[310]: Received SIGTERM from PID 1 (n/a). Jul 12 00:24:19.749017 systemd-journald[310]: Journal stopped Jul 12 00:24:25.498804 kernel: SELinux: Class mctp_socket not defined in policy. Jul 12 00:24:25.498914 kernel: SELinux: Class anon_inode not defined in policy. Jul 12 00:24:25.498947 kernel: SELinux: the above unknown classes and permissions will be allowed Jul 12 00:24:25.498984 kernel: SELinux: policy capability network_peer_controls=1 Jul 12 00:24:25.499015 kernel: SELinux: policy capability open_perms=1 Jul 12 00:24:25.499046 kernel: SELinux: policy capability extended_socket_class=1 Jul 12 00:24:25.499081 kernel: SELinux: policy capability always_check_network=0 Jul 12 00:24:25.499112 kernel: SELinux: policy capability cgroup_seclabel=1 Jul 12 00:24:25.499142 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jul 12 00:24:25.499169 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jul 12 00:24:25.499198 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jul 12 00:24:25.499230 systemd[1]: Successfully loaded SELinux policy in 125.297ms. Jul 12 00:24:25.499302 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 21.124ms. Jul 12 00:24:25.499335 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 12 00:24:25.499367 systemd[1]: Detected virtualization amazon. Jul 12 00:24:25.499398 systemd[1]: Detected architecture arm64. Jul 12 00:24:25.499429 systemd[1]: Detected first boot. Jul 12 00:24:25.499465 systemd[1]: Initializing machine ID from VM UUID. Jul 12 00:24:25.499497 kernel: kauditd_printk_skb: 44 callbacks suppressed Jul 12 00:24:25.499532 kernel: audit: type=1400 audit(1752279860.781:79): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 12 00:24:25.499568 kernel: audit: type=1400 audit(1752279860.781:80): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 12 00:24:25.499599 kernel: audit: type=1334 audit(1752279860.783:81): prog-id=10 op=LOAD Jul 12 00:24:25.499627 kernel: audit: type=1334 audit(1752279860.783:82): prog-id=10 op=UNLOAD Jul 12 00:24:25.499656 kernel: audit: type=1334 audit(1752279860.792:83): prog-id=11 op=LOAD Jul 12 00:24:25.499706 kernel: audit: type=1334 audit(1752279860.792:84): prog-id=11 op=UNLOAD Jul 12 00:24:25.499741 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Jul 12 00:24:25.499777 kernel: audit: type=1400 audit(1752279861.020:85): avc: denied { associate } for pid=1327 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 12 00:24:25.499815 kernel: audit: type=1300 audit(1752279861.020:85): arch=c00000b7 syscall=5 success=yes exit=0 a0=400014589c a1=40000c6de0 a2=40000cd0c0 a3=32 items=0 ppid=1310 pid=1327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:24:25.499847 kernel: audit: type=1327 audit(1752279861.020:85): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 12 00:24:25.501508 kernel: audit: type=1400 audit(1752279861.031:86): avc: denied { associate } for pid=1327 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jul 12 00:24:25.501575 systemd[1]: Populated /etc with preset unit settings. Jul 12 00:24:25.501614 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 12 00:24:25.501665 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 12 00:24:25.501746 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 12 00:24:25.501782 systemd[1]: iscsiuio.service: Deactivated successfully. Jul 12 00:24:25.501815 systemd[1]: Stopped iscsiuio.service. Jul 12 00:24:25.501849 systemd[1]: iscsid.service: Deactivated successfully. Jul 12 00:24:25.501884 systemd[1]: Stopped iscsid.service. Jul 12 00:24:25.501918 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jul 12 00:24:25.501949 systemd[1]: Stopped initrd-switch-root.service. Jul 12 00:24:25.501979 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jul 12 00:24:25.502013 systemd[1]: Created slice system-addon\x2dconfig.slice. Jul 12 00:24:25.502046 systemd[1]: Created slice system-addon\x2drun.slice. Jul 12 00:24:25.502157 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Jul 12 00:24:25.502193 systemd[1]: Created slice system-getty.slice. Jul 12 00:24:25.502224 systemd[1]: Created slice system-modprobe.slice. Jul 12 00:24:25.502254 systemd[1]: Created slice system-serial\x2dgetty.slice. Jul 12 00:24:25.502284 systemd[1]: Created slice system-system\x2dcloudinit.slice. Jul 12 00:24:25.502321 systemd[1]: Created slice system-systemd\x2dfsck.slice. Jul 12 00:24:25.502351 systemd[1]: Created slice user.slice. Jul 12 00:24:25.502382 systemd[1]: Started systemd-ask-password-console.path. Jul 12 00:24:25.502412 systemd[1]: Started systemd-ask-password-wall.path. Jul 12 00:24:25.502442 systemd[1]: Set up automount boot.automount. Jul 12 00:24:25.502471 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Jul 12 00:24:25.502500 systemd[1]: Stopped target initrd-switch-root.target. Jul 12 00:24:25.502531 systemd[1]: Stopped target initrd-fs.target. Jul 12 00:24:25.502562 systemd[1]: Stopped target initrd-root-fs.target. Jul 12 00:24:25.502599 systemd[1]: Reached target integritysetup.target. Jul 12 00:24:25.502634 systemd[1]: Reached target remote-cryptsetup.target. Jul 12 00:24:25.502667 systemd[1]: Reached target remote-fs.target. Jul 12 00:24:25.502744 systemd[1]: Reached target slices.target. Jul 12 00:24:25.502776 systemd[1]: Reached target swap.target. Jul 12 00:24:25.502806 systemd[1]: Reached target torcx.target. Jul 12 00:24:25.502835 systemd[1]: Reached target veritysetup.target. Jul 12 00:24:25.502864 systemd[1]: Listening on systemd-coredump.socket. Jul 12 00:24:25.502896 systemd[1]: Listening on systemd-initctl.socket. Jul 12 00:24:25.502925 systemd[1]: Listening on systemd-networkd.socket. Jul 12 00:24:25.502960 systemd[1]: Listening on systemd-udevd-control.socket. Jul 12 00:24:25.502990 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 12 00:24:25.503021 systemd[1]: Listening on systemd-userdbd.socket. Jul 12 00:24:25.503050 systemd[1]: Mounting dev-hugepages.mount... Jul 12 00:24:25.503079 systemd[1]: Mounting dev-mqueue.mount... Jul 12 00:24:25.503108 systemd[1]: Mounting media.mount... Jul 12 00:24:25.503141 systemd[1]: Mounting sys-kernel-debug.mount... Jul 12 00:24:25.503170 systemd[1]: Mounting sys-kernel-tracing.mount... Jul 12 00:24:25.503201 systemd[1]: Mounting tmp.mount... Jul 12 00:24:25.503234 systemd[1]: Starting flatcar-tmpfiles.service... Jul 12 00:24:25.503267 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 12 00:24:25.503297 systemd[1]: Starting kmod-static-nodes.service... Jul 12 00:24:25.503329 systemd[1]: Starting modprobe@configfs.service... Jul 12 00:24:25.503359 systemd[1]: Starting modprobe@dm_mod.service... Jul 12 00:24:25.503397 systemd[1]: Starting modprobe@drm.service... Jul 12 00:24:25.503426 systemd[1]: Starting modprobe@efi_pstore.service... Jul 12 00:24:25.503457 systemd[1]: Starting modprobe@fuse.service... Jul 12 00:24:25.503488 systemd[1]: Starting modprobe@loop.service... Jul 12 00:24:25.503521 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jul 12 00:24:25.503554 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jul 12 00:24:25.503585 systemd[1]: Stopped systemd-fsck-root.service. Jul 12 00:24:25.503614 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jul 12 00:24:25.503642 systemd[1]: Stopped systemd-fsck-usr.service. Jul 12 00:24:25.503671 systemd[1]: Stopped systemd-journald.service. Jul 12 00:24:25.503721 kernel: fuse: init (API version 7.34) Jul 12 00:24:25.503752 systemd[1]: Starting systemd-journald.service... Jul 12 00:24:25.503786 systemd[1]: Starting systemd-modules-load.service... Jul 12 00:24:25.503815 systemd[1]: Starting systemd-network-generator.service... Jul 12 00:24:25.503849 kernel: loop: module loaded Jul 12 00:24:25.503879 systemd[1]: Starting systemd-remount-fs.service... Jul 12 00:24:25.503908 systemd[1]: Starting systemd-udev-trigger.service... Jul 12 00:24:25.503939 systemd[1]: verity-setup.service: Deactivated successfully. Jul 12 00:24:25.503969 systemd[1]: Stopped verity-setup.service. Jul 12 00:24:25.503999 systemd[1]: Mounted dev-hugepages.mount. Jul 12 00:24:25.504028 systemd[1]: Mounted dev-mqueue.mount. Jul 12 00:24:25.504059 systemd[1]: Mounted media.mount. Jul 12 00:24:25.504090 systemd[1]: Mounted sys-kernel-debug.mount. Jul 12 00:24:25.504124 systemd[1]: Mounted sys-kernel-tracing.mount. Jul 12 00:24:25.504153 systemd[1]: Mounted tmp.mount. Jul 12 00:24:25.504181 systemd[1]: Finished kmod-static-nodes.service. Jul 12 00:24:25.504210 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 12 00:24:25.504239 systemd[1]: Finished modprobe@configfs.service. Jul 12 00:24:25.504276 systemd-journald[1409]: Journal started Jul 12 00:24:25.504374 systemd-journald[1409]: Runtime Journal (/run/log/journal/ec2185f30fe9f812d85a9c8d0c21652d) is 8.0M, max 75.4M, 67.4M free. Jul 12 00:24:20.621000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 12 00:24:25.508770 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 12 00:24:20.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 12 00:24:20.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 12 00:24:20.783000 audit: BPF prog-id=10 op=LOAD Jul 12 00:24:20.783000 audit: BPF prog-id=10 op=UNLOAD Jul 12 00:24:20.792000 audit: BPF prog-id=11 op=LOAD Jul 12 00:24:20.792000 audit: BPF prog-id=11 op=UNLOAD Jul 12 00:24:21.020000 audit[1327]: AVC avc: denied { associate } for pid=1327 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 12 00:24:21.020000 audit[1327]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=400014589c a1=40000c6de0 a2=40000cd0c0 a3=32 items=0 ppid=1310 pid=1327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:24:21.020000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 12 00:24:21.031000 audit[1327]: AVC avc: denied { associate } for pid=1327 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jul 12 00:24:21.031000 audit[1327]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145975 a2=1ed a3=0 items=2 ppid=1310 pid=1327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:24:21.031000 audit: CWD cwd="/" Jul 12 00:24:21.031000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 12 00:24:21.031000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 12 00:24:21.031000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 12 00:24:25.050000 audit: BPF prog-id=12 op=LOAD Jul 12 00:24:25.050000 audit: BPF prog-id=3 op=UNLOAD Jul 12 00:24:25.050000 audit: BPF prog-id=13 op=LOAD Jul 12 00:24:25.050000 audit: BPF prog-id=14 op=LOAD Jul 12 00:24:25.050000 audit: BPF prog-id=4 op=UNLOAD Jul 12 00:24:25.050000 audit: BPF prog-id=5 op=UNLOAD Jul 12 00:24:25.053000 audit: BPF prog-id=15 op=LOAD Jul 12 00:24:25.053000 audit: BPF prog-id=12 op=UNLOAD Jul 12 00:24:25.053000 audit: BPF prog-id=16 op=LOAD Jul 12 00:24:25.053000 audit: BPF prog-id=17 op=LOAD Jul 12 00:24:25.053000 audit: BPF prog-id=13 op=UNLOAD Jul 12 00:24:25.053000 audit: BPF prog-id=14 op=UNLOAD Jul 12 00:24:25.055000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:25.062000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:25.068000 audit: BPF prog-id=15 op=UNLOAD Jul 12 00:24:25.069000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:25.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:25.077000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:25.368000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:25.377000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:25.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:25.384000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:25.385000 audit: BPF prog-id=18 op=LOAD Jul 12 00:24:25.385000 audit: BPF prog-id=19 op=LOAD Jul 12 00:24:25.385000 audit: BPF prog-id=20 op=LOAD Jul 12 00:24:25.385000 audit: BPF prog-id=16 op=UNLOAD Jul 12 00:24:25.385000 audit: BPF prog-id=17 op=UNLOAD Jul 12 00:24:25.445000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:25.494000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jul 12 00:24:25.494000 audit[1409]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=fffffb9c1410 a2=4000 a3=1 items=0 ppid=1 pid=1409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:24:25.494000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jul 12 00:24:25.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:25.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:25.506000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:21.001782 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2025-07-12T00:24:21Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Jul 12 00:24:25.047045 systemd[1]: Queued start job for default target multi-user.target. Jul 12 00:24:21.002835 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2025-07-12T00:24:21Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 12 00:24:25.047068 systemd[1]: Unnecessary job was removed for dev-nvme0n1p6.device. Jul 12 00:24:21.003250 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2025-07-12T00:24:21Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 12 00:24:25.056953 systemd[1]: systemd-journald.service: Deactivated successfully. Jul 12 00:24:21.003338 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2025-07-12T00:24:21Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Jul 12 00:24:21.003365 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2025-07-12T00:24:21Z" level=debug msg="skipped missing lower profile" missing profile=oem Jul 12 00:24:21.003435 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2025-07-12T00:24:21Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Jul 12 00:24:21.003468 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2025-07-12T00:24:21Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Jul 12 00:24:21.003936 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2025-07-12T00:24:21Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Jul 12 00:24:21.004027 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2025-07-12T00:24:21Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 12 00:24:21.004064 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2025-07-12T00:24:21Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 12 00:24:21.012382 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2025-07-12T00:24:21Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Jul 12 00:24:21.012472 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2025-07-12T00:24:21Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Jul 12 00:24:21.012521 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2025-07-12T00:24:21Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 Jul 12 00:24:21.012562 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2025-07-12T00:24:21Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Jul 12 00:24:21.012612 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2025-07-12T00:24:21Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 Jul 12 00:24:21.012650 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2025-07-12T00:24:21Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Jul 12 00:24:24.207826 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2025-07-12T00:24:24Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 12 00:24:24.208441 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2025-07-12T00:24:24Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 12 00:24:25.518565 systemd[1]: Finished modprobe@dm_mod.service. Jul 12 00:24:25.526908 systemd[1]: Started systemd-journald.service. Jul 12 00:24:25.518000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:25.518000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:25.525000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:24.208830 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2025-07-12T00:24:24Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 12 00:24:24.209356 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2025-07-12T00:24:24Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 12 00:24:24.209492 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2025-07-12T00:24:24Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Jul 12 00:24:24.209663 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2025-07-12T00:24:24Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Jul 12 00:24:25.528562 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 12 00:24:25.530004 systemd[1]: Finished modprobe@drm.service. Jul 12 00:24:25.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:25.530000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:25.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:25.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:25.532341 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 12 00:24:25.532595 systemd[1]: Finished modprobe@efi_pstore.service. Jul 12 00:24:25.537166 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jul 12 00:24:25.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:25.538000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:25.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:25.542000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:25.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:25.537501 systemd[1]: Finished modprobe@fuse.service. Jul 12 00:24:25.540565 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 12 00:24:25.542418 systemd[1]: Finished modprobe@loop.service. Jul 12 00:24:25.544836 systemd[1]: Finished systemd-modules-load.service. Jul 12 00:24:25.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:25.548819 systemd[1]: Finished systemd-network-generator.service. Jul 12 00:24:25.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:25.552949 systemd[1]: Finished systemd-remount-fs.service. Jul 12 00:24:25.557059 systemd[1]: Reached target network-pre.target. Jul 12 00:24:25.563952 systemd[1]: Mounting sys-fs-fuse-connections.mount... Jul 12 00:24:25.573462 systemd[1]: Mounting sys-kernel-config.mount... Jul 12 00:24:25.575990 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jul 12 00:24:25.585471 systemd[1]: Starting systemd-hwdb-update.service... Jul 12 00:24:25.590246 systemd[1]: Starting systemd-journal-flush.service... Jul 12 00:24:25.594151 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 12 00:24:25.596506 systemd[1]: Starting systemd-random-seed.service... Jul 12 00:24:25.599282 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 12 00:24:25.602324 systemd[1]: Starting systemd-sysctl.service... Jul 12 00:24:25.609052 systemd[1]: Mounted sys-fs-fuse-connections.mount. Jul 12 00:24:25.612584 systemd[1]: Mounted sys-kernel-config.mount. Jul 12 00:24:25.634638 systemd-journald[1409]: Time spent on flushing to /var/log/journal/ec2185f30fe9f812d85a9c8d0c21652d is 82.434ms for 1133 entries. Jul 12 00:24:25.634638 systemd-journald[1409]: System Journal (/var/log/journal/ec2185f30fe9f812d85a9c8d0c21652d) is 8.0M, max 195.6M, 187.6M free. Jul 12 00:24:25.742637 systemd-journald[1409]: Received client request to flush runtime journal. Jul 12 00:24:25.647000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:25.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:25.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:25.646748 systemd[1]: Finished systemd-random-seed.service. Jul 12 00:24:25.649510 systemd[1]: Reached target first-boot-complete.target. Jul 12 00:24:25.654187 systemd[1]: Finished flatcar-tmpfiles.service. Jul 12 00:24:25.658970 systemd[1]: Starting systemd-sysusers.service... Jul 12 00:24:25.680360 systemd[1]: Finished systemd-sysctl.service. Jul 12 00:24:25.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:25.745102 systemd[1]: Finished systemd-journal-flush.service. Jul 12 00:24:25.753464 systemd[1]: Finished systemd-sysusers.service. Jul 12 00:24:25.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:25.758205 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 12 00:24:25.828883 systemd[1]: Finished systemd-udev-trigger.service. Jul 12 00:24:25.844728 kernel: kauditd_printk_skb: 58 callbacks suppressed Jul 12 00:24:25.844877 kernel: audit: type=1130 audit(1752279865.830:138): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:25.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:25.833787 systemd[1]: Starting systemd-udev-settle.service... Jul 12 00:24:25.851523 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 12 00:24:25.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:25.864821 kernel: audit: type=1130 audit(1752279865.852:139): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:25.868524 udevadm[1447]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Jul 12 00:24:26.492795 systemd[1]: Finished systemd-hwdb-update.service. Jul 12 00:24:26.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:26.505715 kernel: audit: type=1130 audit(1752279866.494:140): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:26.509176 systemd[1]: Starting systemd-udevd.service... Jul 12 00:24:26.506000 audit: BPF prog-id=21 op=LOAD Jul 12 00:24:26.517774 kernel: audit: type=1334 audit(1752279866.506:141): prog-id=21 op=LOAD Jul 12 00:24:26.517907 kernel: audit: type=1334 audit(1752279866.506:142): prog-id=22 op=LOAD Jul 12 00:24:26.506000 audit: BPF prog-id=22 op=LOAD Jul 12 00:24:26.506000 audit: BPF prog-id=7 op=UNLOAD Jul 12 00:24:26.523174 kernel: audit: type=1334 audit(1752279866.506:143): prog-id=7 op=UNLOAD Jul 12 00:24:26.523317 kernel: audit: type=1334 audit(1752279866.506:144): prog-id=8 op=UNLOAD Jul 12 00:24:26.506000 audit: BPF prog-id=8 op=UNLOAD Jul 12 00:24:26.558857 systemd-udevd[1448]: Using default interface naming scheme 'v252'. Jul 12 00:24:26.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:26.605571 systemd[1]: Started systemd-udevd.service. Jul 12 00:24:26.630605 kernel: audit: type=1130 audit(1752279866.611:145): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:26.630733 kernel: audit: type=1334 audit(1752279866.623:146): prog-id=23 op=LOAD Jul 12 00:24:26.623000 audit: BPF prog-id=23 op=LOAD Jul 12 00:24:26.629021 systemd[1]: Starting systemd-networkd.service... Jul 12 00:24:26.643343 kernel: audit: type=1334 audit(1752279866.637:147): prog-id=24 op=LOAD Jul 12 00:24:26.637000 audit: BPF prog-id=24 op=LOAD Jul 12 00:24:26.640000 audit: BPF prog-id=25 op=LOAD Jul 12 00:24:26.640000 audit: BPF prog-id=26 op=LOAD Jul 12 00:24:26.644778 systemd[1]: Starting systemd-userdbd.service... Jul 12 00:24:26.725840 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Jul 12 00:24:26.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:26.740482 systemd[1]: Started systemd-userdbd.service. Jul 12 00:24:26.743558 (udev-worker)[1456]: Network interface NamePolicy= disabled on kernel command line. Jul 12 00:24:26.915089 systemd-networkd[1459]: lo: Link UP Jul 12 00:24:26.915118 systemd-networkd[1459]: lo: Gained carrier Jul 12 00:24:26.916282 systemd-networkd[1459]: Enumeration completed Jul 12 00:24:26.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:26.916498 systemd[1]: Started systemd-networkd.service. Jul 12 00:24:26.916547 systemd-networkd[1459]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 12 00:24:26.920990 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 12 00:24:26.928727 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 12 00:24:26.930079 systemd-networkd[1459]: eth0: Link UP Jul 12 00:24:26.931051 systemd-networkd[1459]: eth0: Gained carrier Jul 12 00:24:26.949984 systemd-networkd[1459]: eth0: DHCPv4 address 172.31.26.167/20, gateway 172.31.16.1 acquired from 172.31.16.1 Jul 12 00:24:27.147652 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 12 00:24:27.151060 systemd[1]: Finished systemd-udev-settle.service. Jul 12 00:24:27.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:27.155981 systemd[1]: Starting lvm2-activation-early.service... Jul 12 00:24:27.234136 lvm[1568]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 12 00:24:27.269431 systemd[1]: Finished lvm2-activation-early.service. Jul 12 00:24:27.270000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:27.272201 systemd[1]: Reached target cryptsetup.target. Jul 12 00:24:27.277020 systemd[1]: Starting lvm2-activation.service... Jul 12 00:24:27.286332 lvm[1569]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 12 00:24:27.324565 systemd[1]: Finished lvm2-activation.service. Jul 12 00:24:27.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:27.326889 systemd[1]: Reached target local-fs-pre.target. Jul 12 00:24:27.328984 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jul 12 00:24:27.329060 systemd[1]: Reached target local-fs.target. Jul 12 00:24:27.331073 systemd[1]: Reached target machines.target. Jul 12 00:24:27.335428 systemd[1]: Starting ldconfig.service... Jul 12 00:24:27.339178 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 12 00:24:27.339304 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 12 00:24:27.341947 systemd[1]: Starting systemd-boot-update.service... Jul 12 00:24:27.346127 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Jul 12 00:24:27.353476 systemd[1]: Starting systemd-machine-id-commit.service... Jul 12 00:24:27.360886 systemd[1]: Starting systemd-sysext.service... Jul 12 00:24:27.374235 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1571 (bootctl) Jul 12 00:24:27.376979 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Jul 12 00:24:27.401941 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Jul 12 00:24:27.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:27.412312 systemd[1]: Unmounting usr-share-oem.mount... Jul 12 00:24:27.427193 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 12 00:24:27.427622 systemd[1]: Unmounted usr-share-oem.mount. Jul 12 00:24:27.458951 kernel: loop0: detected capacity change from 0 to 203944 Jul 12 00:24:27.514492 systemd-fsck[1581]: fsck.fat 4.2 (2021-01-31) Jul 12 00:24:27.514492 systemd-fsck[1581]: /dev/nvme0n1p1: 236 files, 117310/258078 clusters Jul 12 00:24:27.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:27.518570 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Jul 12 00:24:27.524507 systemd[1]: Mounting boot.mount... Jul 12 00:24:27.554158 systemd[1]: Mounted boot.mount. Jul 12 00:24:27.590731 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Jul 12 00:24:27.597077 systemd[1]: Finished systemd-boot-update.service. Jul 12 00:24:27.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:27.619771 kernel: loop1: detected capacity change from 0 to 203944 Jul 12 00:24:27.635476 (sd-sysext)[1597]: Using extensions 'kubernetes'. Jul 12 00:24:27.636943 (sd-sysext)[1597]: Merged extensions into '/usr'. Jul 12 00:24:27.685867 systemd[1]: Mounting usr-share-oem.mount... Jul 12 00:24:27.692164 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 12 00:24:27.696584 systemd[1]: Starting modprobe@dm_mod.service... Jul 12 00:24:27.703879 systemd[1]: Starting modprobe@efi_pstore.service... Jul 12 00:24:27.708503 systemd[1]: Starting modprobe@loop.service... Jul 12 00:24:27.712118 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 12 00:24:27.712411 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 12 00:24:27.714784 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 12 00:24:27.715130 systemd[1]: Finished modprobe@dm_mod.service. Jul 12 00:24:27.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:27.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:27.724387 systemd[1]: Mounted usr-share-oem.mount. Jul 12 00:24:27.727386 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 12 00:24:27.727732 systemd[1]: Finished modprobe@efi_pstore.service. Jul 12 00:24:27.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:27.728000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:27.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:27.732000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:27.730944 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 12 00:24:27.731266 systemd[1]: Finished modprobe@loop.service. Jul 12 00:24:27.735161 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 12 00:24:27.735422 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 12 00:24:27.740072 systemd[1]: Finished systemd-sysext.service. Jul 12 00:24:27.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:27.747940 systemd[1]: Starting ensure-sysext.service... Jul 12 00:24:27.754161 systemd[1]: Starting systemd-tmpfiles-setup.service... Jul 12 00:24:27.767741 systemd[1]: Finished systemd-machine-id-commit.service. Jul 12 00:24:27.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:27.783326 systemd[1]: Reloading. Jul 12 00:24:27.805090 systemd-tmpfiles[1604]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jul 12 00:24:27.812288 systemd-tmpfiles[1604]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jul 12 00:24:27.819145 systemd-tmpfiles[1604]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jul 12 00:24:27.935445 /usr/lib/systemd/system-generators/torcx-generator[1623]: time="2025-07-12T00:24:27Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Jul 12 00:24:27.935510 /usr/lib/systemd/system-generators/torcx-generator[1623]: time="2025-07-12T00:24:27Z" level=info msg="torcx already run" Jul 12 00:24:28.191802 ldconfig[1570]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jul 12 00:24:28.243223 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 12 00:24:28.243269 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 12 00:24:28.283244 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 12 00:24:28.419283 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jul 12 00:24:28.423000 audit: BPF prog-id=27 op=LOAD Jul 12 00:24:28.423000 audit: BPF prog-id=18 op=UNLOAD Jul 12 00:24:28.423000 audit: BPF prog-id=28 op=LOAD Jul 12 00:24:28.423000 audit: BPF prog-id=29 op=LOAD Jul 12 00:24:28.423000 audit: BPF prog-id=19 op=UNLOAD Jul 12 00:24:28.423000 audit: BPF prog-id=20 op=UNLOAD Jul 12 00:24:28.425000 audit: BPF prog-id=30 op=LOAD Jul 12 00:24:28.425000 audit: BPF prog-id=24 op=UNLOAD Jul 12 00:24:28.425000 audit: BPF prog-id=31 op=LOAD Jul 12 00:24:28.425000 audit: BPF prog-id=32 op=LOAD Jul 12 00:24:28.425000 audit: BPF prog-id=25 op=UNLOAD Jul 12 00:24:28.425000 audit: BPF prog-id=26 op=UNLOAD Jul 12 00:24:28.428000 audit: BPF prog-id=33 op=LOAD Jul 12 00:24:28.428000 audit: BPF prog-id=34 op=LOAD Jul 12 00:24:28.428000 audit: BPF prog-id=21 op=UNLOAD Jul 12 00:24:28.428000 audit: BPF prog-id=22 op=UNLOAD Jul 12 00:24:28.431000 audit: BPF prog-id=35 op=LOAD Jul 12 00:24:28.431000 audit: BPF prog-id=23 op=UNLOAD Jul 12 00:24:28.446493 systemd[1]: Finished ldconfig.service. Jul 12 00:24:28.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:28.450642 systemd[1]: Finished systemd-tmpfiles-setup.service. Jul 12 00:24:28.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:28.462210 systemd[1]: Starting audit-rules.service... Jul 12 00:24:28.467398 systemd[1]: Starting clean-ca-certificates.service... Jul 12 00:24:28.473517 systemd[1]: Starting systemd-journal-catalog-update.service... Jul 12 00:24:28.478000 audit: BPF prog-id=36 op=LOAD Jul 12 00:24:28.484000 audit: BPF prog-id=37 op=LOAD Jul 12 00:24:28.482804 systemd[1]: Starting systemd-resolved.service... Jul 12 00:24:28.490085 systemd[1]: Starting systemd-timesyncd.service... Jul 12 00:24:28.495785 systemd[1]: Starting systemd-update-utmp.service... Jul 12 00:24:28.500173 systemd[1]: Finished clean-ca-certificates.service. Jul 12 00:24:28.503000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:28.510758 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 12 00:24:28.517333 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 12 00:24:28.520200 systemd[1]: Starting modprobe@dm_mod.service... Jul 12 00:24:28.526033 systemd[1]: Starting modprobe@efi_pstore.service... Jul 12 00:24:28.532121 systemd[1]: Starting modprobe@loop.service... Jul 12 00:24:28.534149 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 12 00:24:28.534519 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 12 00:24:28.534853 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 12 00:24:28.539481 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 12 00:24:28.539921 systemd[1]: Finished modprobe@dm_mod.service. Jul 12 00:24:28.538000 audit[1686]: SYSTEM_BOOT pid=1686 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 12 00:24:28.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:28.543000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:28.555462 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 12 00:24:28.558793 systemd[1]: Starting modprobe@dm_mod.service... Jul 12 00:24:28.560854 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 12 00:24:28.561339 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 12 00:24:28.561818 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 12 00:24:28.572844 systemd[1]: Finished systemd-update-utmp.service. Jul 12 00:24:28.573000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:28.576053 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 12 00:24:28.576371 systemd[1]: Finished modprobe@efi_pstore.service. Jul 12 00:24:28.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:28.584000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:28.590550 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 12 00:24:28.594024 systemd[1]: Starting modprobe@drm.service... Jul 12 00:24:28.596103 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 12 00:24:28.596295 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 12 00:24:28.596433 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 12 00:24:28.596547 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 12 00:24:28.598279 systemd[1]: Finished ensure-sysext.service. Jul 12 00:24:28.599000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:28.601492 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 12 00:24:28.601850 systemd[1]: Finished modprobe@loop.service. Jul 12 00:24:28.602000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:28.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:28.612011 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 12 00:24:28.612352 systemd[1]: Finished modprobe@dm_mod.service. Jul 12 00:24:28.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:28.613000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:28.614728 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 12 00:24:28.617053 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 12 00:24:28.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:28.618000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:28.617398 systemd[1]: Finished modprobe@drm.service. Jul 12 00:24:28.624905 systemd[1]: Finished systemd-journal-catalog-update.service. Jul 12 00:24:28.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:28.635991 systemd[1]: Starting systemd-update-done.service... Jul 12 00:24:28.670347 systemd[1]: Finished systemd-update-done.service. Jul 12 00:24:28.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:28.686921 systemd-networkd[1459]: eth0: Gained IPv6LL Jul 12 00:24:28.694478 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 12 00:24:28.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:28.699000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 12 00:24:28.699000 audit[1706]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffec6ae9e0 a2=420 a3=0 items=0 ppid=1680 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:24:28.699000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jul 12 00:24:28.702086 augenrules[1706]: No rules Jul 12 00:24:28.703841 systemd[1]: Finished audit-rules.service. Jul 12 00:24:28.744144 systemd-resolved[1683]: Positive Trust Anchors: Jul 12 00:24:28.744863 systemd-resolved[1683]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 12 00:24:28.745072 systemd-resolved[1683]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 12 00:24:28.761227 systemd[1]: Started systemd-timesyncd.service. Jul 12 00:24:28.763853 systemd[1]: Reached target time-set.target. Jul 12 00:24:28.782275 systemd-resolved[1683]: Defaulting to hostname 'linux'. Jul 12 00:24:28.785887 systemd[1]: Started systemd-resolved.service. Jul 12 00:24:28.788130 systemd[1]: Reached target network.target. Jul 12 00:24:28.790023 systemd[1]: Reached target network-online.target. Jul 12 00:24:28.792111 systemd[1]: Reached target nss-lookup.target. Jul 12 00:24:28.794159 systemd[1]: Reached target sysinit.target. Jul 12 00:24:28.796257 systemd[1]: Started motdgen.path. Jul 12 00:24:28.798125 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Jul 12 00:24:28.801189 systemd[1]: Started logrotate.timer. Jul 12 00:24:28.803369 systemd[1]: Started mdadm.timer. Jul 12 00:24:28.805134 systemd[1]: Started systemd-tmpfiles-clean.timer. Jul 12 00:24:28.807234 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 12 00:24:28.807316 systemd[1]: Reached target paths.target. Jul 12 00:24:28.809234 systemd[1]: Reached target timers.target. Jul 12 00:24:28.812091 systemd[1]: Listening on dbus.socket. Jul 12 00:24:28.816344 systemd[1]: Starting docker.socket... Jul 12 00:24:28.825095 systemd[1]: Listening on sshd.socket. Jul 12 00:24:28.827273 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 12 00:24:28.828299 systemd[1]: Listening on docker.socket. Jul 12 00:24:28.830463 systemd[1]: Reached target sockets.target. Jul 12 00:24:28.832403 systemd[1]: Reached target basic.target. Jul 12 00:24:28.834385 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 12 00:24:28.834459 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 12 00:24:28.836883 systemd[1]: Started amazon-ssm-agent.service. Jul 12 00:24:28.843751 systemd[1]: Starting containerd.service... Jul 12 00:24:28.852398 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Jul 12 00:24:28.874747 systemd[1]: Starting dbus.service... Jul 12 00:24:28.880703 systemd-timesyncd[1685]: Contacted time server 149.28.200.179:123 (0.flatcar.pool.ntp.org). Jul 12 00:24:28.880994 systemd-timesyncd[1685]: Initial clock synchronization to Sat 2025-07-12 00:24:29.123609 UTC. Jul 12 00:24:28.882816 systemd[1]: Starting enable-oem-cloudinit.service... Jul 12 00:24:28.895100 systemd[1]: Starting extend-filesystems.service... Jul 12 00:24:28.901766 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Jul 12 00:24:28.905671 systemd[1]: Starting kubelet.service... Jul 12 00:24:28.912158 systemd[1]: Starting motdgen.service... Jul 12 00:24:28.917881 systemd[1]: Started nvidia.service. Jul 12 00:24:28.933156 systemd[1]: Starting prepare-helm.service... Jul 12 00:24:28.959225 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 12 00:24:28.971496 systemd[1]: Starting sshd-keygen.service... Jul 12 00:24:28.979195 systemd[1]: Starting systemd-logind.service... Jul 12 00:24:28.981307 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 12 00:24:28.981489 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 12 00:24:29.073298 jq[1718]: false Jul 12 00:24:28.983330 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jul 12 00:24:29.074143 jq[1728]: true Jul 12 00:24:28.985362 systemd[1]: Starting update-engine.service... Jul 12 00:24:28.990459 systemd[1]: Starting update-ssh-keys-after-ignition.service... Jul 12 00:24:29.093692 tar[1732]: linux-arm64/helm Jul 12 00:24:29.070155 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 12 00:24:29.070572 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 12 00:24:29.075967 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 12 00:24:29.076359 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 12 00:24:29.128145 jq[1738]: true Jul 12 00:24:29.249203 extend-filesystems[1719]: Found loop1 Jul 12 00:24:29.254481 bash[1771]: Updated "/home/core/.ssh/authorized_keys" Jul 12 00:24:29.255495 extend-filesystems[1719]: Found nvme0n1 Jul 12 00:24:29.258285 systemd[1]: Finished update-ssh-keys-after-ignition.service. Jul 12 00:24:29.260934 extend-filesystems[1719]: Found nvme0n1p1 Jul 12 00:24:29.260934 extend-filesystems[1719]: Found nvme0n1p2 Jul 12 00:24:29.260934 extend-filesystems[1719]: Found nvme0n1p3 Jul 12 00:24:29.260934 extend-filesystems[1719]: Found usr Jul 12 00:24:29.260934 extend-filesystems[1719]: Found nvme0n1p4 Jul 12 00:24:29.260934 extend-filesystems[1719]: Found nvme0n1p6 Jul 12 00:24:29.260934 extend-filesystems[1719]: Found nvme0n1p7 Jul 12 00:24:29.260934 extend-filesystems[1719]: Found nvme0n1p9 Jul 12 00:24:29.260934 extend-filesystems[1719]: Checking size of /dev/nvme0n1p9 Jul 12 00:24:29.499481 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Jul 12 00:24:29.289263 systemd[1]: motdgen.service: Deactivated successfully. Jul 12 00:24:29.289567 dbus-daemon[1717]: [system] SELinux support is enabled Jul 12 00:24:29.508972 extend-filesystems[1719]: Resized partition /dev/nvme0n1p9 Jul 12 00:24:29.289661 systemd[1]: Finished motdgen.service. Jul 12 00:24:29.313051 dbus-daemon[1717]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1459 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Jul 12 00:24:29.526385 extend-filesystems[1786]: resize2fs 1.46.5 (30-Dec-2021) Jul 12 00:24:29.291771 systemd[1]: Started dbus.service. Jul 12 00:24:29.315190 dbus-daemon[1717]: [system] Successfully activated service 'org.freedesktop.systemd1' Jul 12 00:24:29.551810 update_engine[1727]: I0712 00:24:29.537801 1727 main.cc:92] Flatcar Update Engine starting Jul 12 00:24:29.298703 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jul 12 00:24:29.562579 env[1733]: time="2025-07-12T00:24:29.552787333Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Jul 12 00:24:29.298782 systemd[1]: Reached target system-config.target. Jul 12 00:24:29.300835 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jul 12 00:24:29.300868 systemd[1]: Reached target user-config.target. Jul 12 00:24:29.323010 systemd[1]: Starting systemd-hostnamed.service... Jul 12 00:24:29.538013 systemd[1]: nvidia.service: Deactivated successfully. Jul 12 00:24:29.571351 systemd[1]: Started update-engine.service. Jul 12 00:24:29.572903 update_engine[1727]: I0712 00:24:29.572496 1727 update_check_scheduler.cc:74] Next update check in 3m29s Jul 12 00:24:29.580676 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Jul 12 00:24:29.581142 systemd[1]: Started locksmithd.service. Jul 12 00:24:29.598416 amazon-ssm-agent[1714]: 2025/07/12 00:24:29 Failed to load instance info from vault. RegistrationKey does not exist. Jul 12 00:24:29.604066 extend-filesystems[1786]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Jul 12 00:24:29.604066 extend-filesystems[1786]: old_desc_blocks = 1, new_desc_blocks = 1 Jul 12 00:24:29.604066 extend-filesystems[1786]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Jul 12 00:24:29.661279 extend-filesystems[1719]: Resized filesystem in /dev/nvme0n1p9 Jul 12 00:24:29.605562 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 12 00:24:29.680578 amazon-ssm-agent[1714]: Initializing new seelog logger Jul 12 00:24:29.680578 amazon-ssm-agent[1714]: New Seelog Logger Creation Complete Jul 12 00:24:29.680578 amazon-ssm-agent[1714]: 2025/07/12 00:24:29 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Jul 12 00:24:29.680578 amazon-ssm-agent[1714]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Jul 12 00:24:29.680578 amazon-ssm-agent[1714]: 2025/07/12 00:24:29 processing appconfig overrides Jul 12 00:24:29.605999 systemd[1]: Finished extend-filesystems.service. Jul 12 00:24:29.750813 systemd-logind[1726]: Watching system buttons on /dev/input/event0 (Power Button) Jul 12 00:24:29.750872 systemd-logind[1726]: Watching system buttons on /dev/input/event1 (Sleep Button) Jul 12 00:24:29.756241 systemd-logind[1726]: New seat seat0. Jul 12 00:24:29.767779 systemd[1]: Started systemd-logind.service. Jul 12 00:24:29.825484 env[1733]: time="2025-07-12T00:24:29.825389865Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 12 00:24:29.829808 env[1733]: time="2025-07-12T00:24:29.825681685Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 12 00:24:29.837166 env[1733]: time="2025-07-12T00:24:29.837081877Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.186-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 12 00:24:29.837166 env[1733]: time="2025-07-12T00:24:29.837156610Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 12 00:24:29.837676 env[1733]: time="2025-07-12T00:24:29.837618754Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 12 00:24:29.837788 env[1733]: time="2025-07-12T00:24:29.837671390Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 12 00:24:29.844867 env[1733]: time="2025-07-12T00:24:29.844788799Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 12 00:24:29.844867 env[1733]: time="2025-07-12T00:24:29.844859105Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 12 00:24:29.845157 env[1733]: time="2025-07-12T00:24:29.845105744Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 12 00:24:29.845878 env[1733]: time="2025-07-12T00:24:29.845824457Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 12 00:24:29.846212 env[1733]: time="2025-07-12T00:24:29.846147868Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 12 00:24:29.846212 env[1733]: time="2025-07-12T00:24:29.846203942Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 12 00:24:29.846394 env[1733]: time="2025-07-12T00:24:29.846343540Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 12 00:24:29.846394 env[1733]: time="2025-07-12T00:24:29.846384554Z" level=info msg="metadata content store policy set" policy=shared Jul 12 00:24:29.868901 env[1733]: time="2025-07-12T00:24:29.868806738Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 12 00:24:29.869067 env[1733]: time="2025-07-12T00:24:29.868904222Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 12 00:24:29.869067 env[1733]: time="2025-07-12T00:24:29.868939387Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 12 00:24:29.869067 env[1733]: time="2025-07-12T00:24:29.869013142Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 12 00:24:29.869067 env[1733]: time="2025-07-12T00:24:29.869051807Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 12 00:24:29.869318 env[1733]: time="2025-07-12T00:24:29.869085662Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 12 00:24:29.869318 env[1733]: time="2025-07-12T00:24:29.869118032Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 12 00:24:29.869726 env[1733]: time="2025-07-12T00:24:29.869652077Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 12 00:24:29.869837 env[1733]: time="2025-07-12T00:24:29.869731496Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 12 00:24:29.869837 env[1733]: time="2025-07-12T00:24:29.869768380Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 12 00:24:29.869837 env[1733]: time="2025-07-12T00:24:29.869804102Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 12 00:24:29.870046 env[1733]: time="2025-07-12T00:24:29.869837276Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 12 00:24:29.870113 env[1733]: time="2025-07-12T00:24:29.870073851Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 12 00:24:29.870308 env[1733]: time="2025-07-12T00:24:29.870261374Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 12 00:24:29.870800 env[1733]: time="2025-07-12T00:24:29.870739691Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 12 00:24:29.870883 env[1733]: time="2025-07-12T00:24:29.870806646Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 12 00:24:29.870883 env[1733]: time="2025-07-12T00:24:29.870845162Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 12 00:24:29.871138 env[1733]: time="2025-07-12T00:24:29.871096018Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 12 00:24:29.871250 env[1733]: time="2025-07-12T00:24:29.871142954Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 12 00:24:29.871250 env[1733]: time="2025-07-12T00:24:29.871177415Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 12 00:24:29.871250 env[1733]: time="2025-07-12T00:24:29.871207041Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 12 00:24:29.871250 env[1733]: time="2025-07-12T00:24:29.871239350Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 12 00:24:29.871453 env[1733]: time="2025-07-12T00:24:29.871269854Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 12 00:24:29.871453 env[1733]: time="2025-07-12T00:24:29.871304784Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 12 00:24:29.871453 env[1733]: time="2025-07-12T00:24:29.871334867Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 12 00:24:29.871453 env[1733]: time="2025-07-12T00:24:29.871369340Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 12 00:24:29.871675 env[1733]: time="2025-07-12T00:24:29.871646656Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 12 00:24:29.871762 env[1733]: time="2025-07-12T00:24:29.871692344Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 12 00:24:29.871838 env[1733]: time="2025-07-12T00:24:29.871757308Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 12 00:24:29.871838 env[1733]: time="2025-07-12T00:24:29.871790334Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 12 00:24:29.871838 env[1733]: time="2025-07-12T00:24:29.871822891Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 12 00:24:29.871999 env[1733]: time="2025-07-12T00:24:29.871850167Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 12 00:24:29.872215 env[1733]: time="2025-07-12T00:24:29.872081276Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 12 00:24:29.872215 env[1733]: time="2025-07-12T00:24:29.872186265Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 12 00:24:29.872648 env[1733]: time="2025-07-12T00:24:29.872533788Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 12 00:24:29.872648 env[1733]: time="2025-07-12T00:24:29.872656125Z" level=info msg="Connect containerd service" Jul 12 00:24:29.874959 env[1733]: time="2025-07-12T00:24:29.872738400Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 12 00:24:29.887988 env[1733]: time="2025-07-12T00:24:29.887891262Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 12 00:24:29.888672 env[1733]: time="2025-07-12T00:24:29.888597028Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 12 00:24:29.890420 env[1733]: time="2025-07-12T00:24:29.889066603Z" level=info msg="Start subscribing containerd event" Jul 12 00:24:29.890420 env[1733]: time="2025-07-12T00:24:29.889546466Z" level=info msg="Start recovering state" Jul 12 00:24:29.893423 env[1733]: time="2025-07-12T00:24:29.893338691Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 12 00:24:29.893646 systemd[1]: Started containerd.service. Jul 12 00:24:29.897140 env[1733]: time="2025-07-12T00:24:29.897061487Z" level=info msg="Start event monitor" Jul 12 00:24:29.897140 env[1733]: time="2025-07-12T00:24:29.897131744Z" level=info msg="Start snapshots syncer" Jul 12 00:24:29.897372 env[1733]: time="2025-07-12T00:24:29.897162297Z" level=info msg="Start cni network conf syncer for default" Jul 12 00:24:29.897372 env[1733]: time="2025-07-12T00:24:29.897185197Z" level=info msg="Start streaming server" Jul 12 00:24:29.897551 env[1733]: time="2025-07-12T00:24:29.897387558Z" level=info msg="containerd successfully booted in 0.378308s" Jul 12 00:24:29.963066 dbus-daemon[1717]: [system] Successfully activated service 'org.freedesktop.hostname1' Jul 12 00:24:29.963359 systemd[1]: Started systemd-hostnamed.service. Jul 12 00:24:29.967823 dbus-daemon[1717]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1775 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Jul 12 00:24:29.973663 systemd[1]: Starting polkit.service... Jul 12 00:24:30.017818 polkitd[1817]: Started polkitd version 121 Jul 12 00:24:30.070761 polkitd[1817]: Loading rules from directory /etc/polkit-1/rules.d Jul 12 00:24:30.073903 polkitd[1817]: Loading rules from directory /usr/share/polkit-1/rules.d Jul 12 00:24:30.080800 polkitd[1817]: Finished loading, compiling and executing 2 rules Jul 12 00:24:30.082021 dbus-daemon[1717]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Jul 12 00:24:30.082337 systemd[1]: Started polkit.service. Jul 12 00:24:30.086462 polkitd[1817]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Jul 12 00:24:30.131262 systemd-hostnamed[1775]: Hostname set to (transient) Jul 12 00:24:30.131448 systemd-resolved[1683]: System hostname changed to 'ip-172-31-26-167'. Jul 12 00:24:30.255176 coreos-metadata[1716]: Jul 12 00:24:30.254 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Jul 12 00:24:30.257114 coreos-metadata[1716]: Jul 12 00:24:30.256 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Jul 12 00:24:30.259380 coreos-metadata[1716]: Jul 12 00:24:30.259 INFO Fetch successful Jul 12 00:24:30.259741 coreos-metadata[1716]: Jul 12 00:24:30.259 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Jul 12 00:24:30.261127 coreos-metadata[1716]: Jul 12 00:24:30.260 INFO Fetch successful Jul 12 00:24:30.264872 unknown[1716]: wrote ssh authorized keys file for user: core Jul 12 00:24:30.311512 update-ssh-keys[1842]: Updated "/home/core/.ssh/authorized_keys" Jul 12 00:24:30.312731 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Jul 12 00:24:30.577052 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO Create new startup processor Jul 12 00:24:30.585874 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO [LongRunningPluginsManager] registered plugins: {} Jul 12 00:24:30.589144 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO Initializing bookkeeping folders Jul 12 00:24:30.589393 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO removing the completed state files Jul 12 00:24:30.589538 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO Initializing bookkeeping folders for long running plugins Jul 12 00:24:30.589710 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Jul 12 00:24:30.590894 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO Initializing healthcheck folders for long running plugins Jul 12 00:24:30.591084 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO Initializing locations for inventory plugin Jul 12 00:24:30.591255 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO Initializing default location for custom inventory Jul 12 00:24:30.591403 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO Initializing default location for file inventory Jul 12 00:24:30.593117 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO Initializing default location for role inventory Jul 12 00:24:30.593351 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO Init the cloudwatchlogs publisher Jul 12 00:24:30.593584 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO [instanceID=i-09f69d6499387773e] Successfully loaded platform independent plugin aws:softwareInventory Jul 12 00:24:30.593766 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO [instanceID=i-09f69d6499387773e] Successfully loaded platform independent plugin aws:runPowerShellScript Jul 12 00:24:30.599709 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO [instanceID=i-09f69d6499387773e] Successfully loaded platform independent plugin aws:updateSsmAgent Jul 12 00:24:30.601981 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO [instanceID=i-09f69d6499387773e] Successfully loaded platform independent plugin aws:refreshAssociation Jul 12 00:24:30.602235 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO [instanceID=i-09f69d6499387773e] Successfully loaded platform independent plugin aws:configurePackage Jul 12 00:24:30.602384 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO [instanceID=i-09f69d6499387773e] Successfully loaded platform independent plugin aws:configureDocker Jul 12 00:24:30.606111 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO [instanceID=i-09f69d6499387773e] Successfully loaded platform independent plugin aws:runDockerAction Jul 12 00:24:30.606516 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO [instanceID=i-09f69d6499387773e] Successfully loaded platform independent plugin aws:downloadContent Jul 12 00:24:30.606853 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO [instanceID=i-09f69d6499387773e] Successfully loaded platform independent plugin aws:runDocument Jul 12 00:24:30.607001 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO [instanceID=i-09f69d6499387773e] Successfully loaded platform dependent plugin aws:runShellScript Jul 12 00:24:30.607166 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Jul 12 00:24:30.607307 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO OS: linux, Arch: arm64 Jul 12 00:24:30.612975 amazon-ssm-agent[1714]: datastore file /var/lib/amazon/ssm/i-09f69d6499387773e/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Jul 12 00:24:30.679636 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO [MessagingDeliveryService] Starting document processing engine... Jul 12 00:24:30.775515 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO [MessagingDeliveryService] [EngineProcessor] Starting Jul 12 00:24:30.870131 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Jul 12 00:24:30.964586 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO [MessagingDeliveryService] Starting message polling Jul 12 00:24:31.059335 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO [MessagingDeliveryService] Starting send replies to MDS Jul 12 00:24:31.146157 tar[1732]: linux-arm64/LICENSE Jul 12 00:24:31.146844 tar[1732]: linux-arm64/README.md Jul 12 00:24:31.154249 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO [instanceID=i-09f69d6499387773e] Starting association polling Jul 12 00:24:31.155724 systemd[1]: Finished prepare-helm.service. Jul 12 00:24:31.249936 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Jul 12 00:24:31.314474 locksmithd[1795]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jul 12 00:24:31.344854 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO [MessagingDeliveryService] [Association] Launching response handler Jul 12 00:24:31.440489 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Jul 12 00:24:31.536126 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Jul 12 00:24:31.632098 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Jul 12 00:24:31.728280 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO [MessageGatewayService] Starting session document processing engine... Jul 12 00:24:31.824168 systemd[1]: Started kubelet.service. Jul 12 00:24:31.826019 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO [MessageGatewayService] [EngineProcessor] Starting Jul 12 00:24:31.922670 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Jul 12 00:24:32.019479 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-09f69d6499387773e, requestId: 7c27ac3f-e752-4d28-a3a6-f345a6c66804 Jul 12 00:24:32.116307 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO [OfflineService] Starting document processing engine... Jul 12 00:24:32.213424 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO [OfflineService] [EngineProcessor] Starting Jul 12 00:24:32.310828 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO [OfflineService] [EngineProcessor] Initial processing Jul 12 00:24:32.408291 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO [OfflineService] Starting message polling Jul 12 00:24:32.505989 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO [OfflineService] Starting send replies to MDS Jul 12 00:24:32.603970 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO [HealthCheck] HealthCheck reporting agent health. Jul 12 00:24:32.701928 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO [MessageGatewayService] listening reply. Jul 12 00:24:32.780003 sshd_keygen[1752]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jul 12 00:24:32.800208 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO [LongRunningPluginsManager] starting long running plugin manager Jul 12 00:24:32.811528 kubelet[1929]: E0712 00:24:32.811467 1929 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 12 00:24:32.815329 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 12 00:24:32.815672 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 12 00:24:32.816164 systemd[1]: kubelet.service: Consumed 1.645s CPU time. Jul 12 00:24:32.821646 systemd[1]: Finished sshd-keygen.service. Jul 12 00:24:32.826618 systemd[1]: Starting issuegen.service... Jul 12 00:24:32.837113 systemd[1]: issuegen.service: Deactivated successfully. Jul 12 00:24:32.837534 systemd[1]: Finished issuegen.service. Jul 12 00:24:32.842679 systemd[1]: Starting systemd-user-sessions.service... Jul 12 00:24:32.857814 systemd[1]: Finished systemd-user-sessions.service. Jul 12 00:24:32.863198 systemd[1]: Started getty@tty1.service. Jul 12 00:24:32.868174 systemd[1]: Started serial-getty@ttyS0.service. Jul 12 00:24:32.870605 systemd[1]: Reached target getty.target. Jul 12 00:24:32.872702 systemd[1]: Reached target multi-user.target. Jul 12 00:24:32.877685 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 12 00:24:32.896007 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 12 00:24:32.896384 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 12 00:24:32.899843 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Jul 12 00:24:32.898842 systemd[1]: Startup finished in 1.253s (kernel) + 8.884s (initrd) + 12.408s (userspace) = 22.547s. Jul 12 00:24:32.997866 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Jul 12 00:24:33.098527 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO [StartupProcessor] Executing startup processor tasks Jul 12 00:24:33.198193 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Jul 12 00:24:33.299165 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Jul 12 00:24:33.399120 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.7 Jul 12 00:24:33.498848 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-09f69d6499387773e?role=subscribe&stream=input Jul 12 00:24:33.600409 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-09f69d6499387773e?role=subscribe&stream=input Jul 12 00:24:33.701991 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO [MessageGatewayService] Starting receiving message from control channel Jul 12 00:24:33.804062 amazon-ssm-agent[1714]: 2025-07-12 00:24:30 INFO [MessageGatewayService] [EngineProcessor] Initial processing Jul 12 00:24:38.243073 systemd[1]: Created slice system-sshd.slice. Jul 12 00:24:38.245814 systemd[1]: Started sshd@0-172.31.26.167:22-147.75.109.163:58412.service. Jul 12 00:24:38.439634 sshd[1949]: Accepted publickey for core from 147.75.109.163 port 58412 ssh2: RSA SHA256:hAayEOBHnTpwll2xPQSU8cSp7XCWn/pXChvPbqogNKA Jul 12 00:24:38.445583 sshd[1949]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 12 00:24:38.467311 systemd[1]: Created slice user-500.slice. Jul 12 00:24:38.469823 systemd[1]: Starting user-runtime-dir@500.service... Jul 12 00:24:38.478920 systemd-logind[1726]: New session 1 of user core. Jul 12 00:24:38.493228 systemd[1]: Finished user-runtime-dir@500.service. Jul 12 00:24:38.497933 systemd[1]: Starting user@500.service... Jul 12 00:24:38.505924 (systemd)[1952]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jul 12 00:24:38.688041 systemd[1952]: Queued start job for default target default.target. Jul 12 00:24:38.689100 systemd[1952]: Reached target paths.target. Jul 12 00:24:38.689154 systemd[1952]: Reached target sockets.target. Jul 12 00:24:38.689187 systemd[1952]: Reached target timers.target. Jul 12 00:24:38.689216 systemd[1952]: Reached target basic.target. Jul 12 00:24:38.689375 systemd[1]: Started user@500.service. Jul 12 00:24:38.691280 systemd[1]: Started session-1.scope. Jul 12 00:24:38.692282 systemd[1952]: Reached target default.target. Jul 12 00:24:38.692600 systemd[1952]: Startup finished in 174ms. Jul 12 00:24:38.839078 systemd[1]: Started sshd@1-172.31.26.167:22-147.75.109.163:58422.service. Jul 12 00:24:39.022080 sshd[1961]: Accepted publickey for core from 147.75.109.163 port 58422 ssh2: RSA SHA256:hAayEOBHnTpwll2xPQSU8cSp7XCWn/pXChvPbqogNKA Jul 12 00:24:39.024678 sshd[1961]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 12 00:24:39.032096 systemd-logind[1726]: New session 2 of user core. Jul 12 00:24:39.034179 systemd[1]: Started session-2.scope. Jul 12 00:24:39.168158 sshd[1961]: pam_unix(sshd:session): session closed for user core Jul 12 00:24:39.174044 systemd-logind[1726]: Session 2 logged out. Waiting for processes to exit. Jul 12 00:24:39.174617 systemd[1]: sshd@1-172.31.26.167:22-147.75.109.163:58422.service: Deactivated successfully. Jul 12 00:24:39.175957 systemd[1]: session-2.scope: Deactivated successfully. Jul 12 00:24:39.177540 systemd-logind[1726]: Removed session 2. Jul 12 00:24:39.196729 systemd[1]: Started sshd@2-172.31.26.167:22-147.75.109.163:58436.service. Jul 12 00:24:39.375623 sshd[1967]: Accepted publickey for core from 147.75.109.163 port 58436 ssh2: RSA SHA256:hAayEOBHnTpwll2xPQSU8cSp7XCWn/pXChvPbqogNKA Jul 12 00:24:39.378668 sshd[1967]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 12 00:24:39.386385 systemd-logind[1726]: New session 3 of user core. Jul 12 00:24:39.387383 systemd[1]: Started session-3.scope. Jul 12 00:24:39.511181 sshd[1967]: pam_unix(sshd:session): session closed for user core Jul 12 00:24:39.517947 systemd[1]: sshd@2-172.31.26.167:22-147.75.109.163:58436.service: Deactivated successfully. Jul 12 00:24:39.519307 systemd[1]: session-3.scope: Deactivated successfully. Jul 12 00:24:39.521239 systemd-logind[1726]: Session 3 logged out. Waiting for processes to exit. Jul 12 00:24:39.524132 systemd-logind[1726]: Removed session 3. Jul 12 00:24:39.539749 systemd[1]: Started sshd@3-172.31.26.167:22-147.75.109.163:58448.service. Jul 12 00:24:39.717835 sshd[1973]: Accepted publickey for core from 147.75.109.163 port 58448 ssh2: RSA SHA256:hAayEOBHnTpwll2xPQSU8cSp7XCWn/pXChvPbqogNKA Jul 12 00:24:39.720534 sshd[1973]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 12 00:24:39.729554 systemd[1]: Started session-4.scope. Jul 12 00:24:39.730594 systemd-logind[1726]: New session 4 of user core. Jul 12 00:24:39.861548 sshd[1973]: pam_unix(sshd:session): session closed for user core Jul 12 00:24:39.867230 systemd[1]: sshd@3-172.31.26.167:22-147.75.109.163:58448.service: Deactivated successfully. Jul 12 00:24:39.868552 systemd[1]: session-4.scope: Deactivated successfully. Jul 12 00:24:39.870155 systemd-logind[1726]: Session 4 logged out. Waiting for processes to exit. Jul 12 00:24:39.872790 systemd-logind[1726]: Removed session 4. Jul 12 00:24:39.889905 systemd[1]: Started sshd@4-172.31.26.167:22-147.75.109.163:58458.service. Jul 12 00:24:40.066820 sshd[1979]: Accepted publickey for core from 147.75.109.163 port 58458 ssh2: RSA SHA256:hAayEOBHnTpwll2xPQSU8cSp7XCWn/pXChvPbqogNKA Jul 12 00:24:40.069889 sshd[1979]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 12 00:24:40.077476 systemd-logind[1726]: New session 5 of user core. Jul 12 00:24:40.078581 systemd[1]: Started session-5.scope. Jul 12 00:24:40.204582 sudo[1982]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jul 12 00:24:40.205932 sudo[1982]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 12 00:24:40.224386 dbus-daemon[1717]: avc: received setenforce notice (enforcing=1) Jul 12 00:24:40.225174 sudo[1982]: pam_unix(sudo:session): session closed for user root Jul 12 00:24:40.250411 sshd[1979]: pam_unix(sshd:session): session closed for user core Jul 12 00:24:40.255837 systemd-logind[1726]: Session 5 logged out. Waiting for processes to exit. Jul 12 00:24:40.256512 systemd[1]: sshd@4-172.31.26.167:22-147.75.109.163:58458.service: Deactivated successfully. Jul 12 00:24:40.257815 systemd[1]: session-5.scope: Deactivated successfully. Jul 12 00:24:40.259521 systemd-logind[1726]: Removed session 5. Jul 12 00:24:40.278206 systemd[1]: Started sshd@5-172.31.26.167:22-147.75.109.163:58462.service. Jul 12 00:24:40.454521 sshd[1986]: Accepted publickey for core from 147.75.109.163 port 58462 ssh2: RSA SHA256:hAayEOBHnTpwll2xPQSU8cSp7XCWn/pXChvPbqogNKA Jul 12 00:24:40.457663 sshd[1986]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 12 00:24:40.465927 systemd-logind[1726]: New session 6 of user core. Jul 12 00:24:40.466850 systemd[1]: Started session-6.scope. Jul 12 00:24:40.574540 sudo[1990]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jul 12 00:24:40.575592 sudo[1990]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 12 00:24:40.581263 sudo[1990]: pam_unix(sudo:session): session closed for user root Jul 12 00:24:40.591182 sudo[1989]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jul 12 00:24:40.592248 sudo[1989]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 12 00:24:40.610073 systemd[1]: Stopping audit-rules.service... Jul 12 00:24:40.610000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 12 00:24:40.612798 auditctl[1993]: No rules Jul 12 00:24:40.614502 kernel: kauditd_printk_skb: 60 callbacks suppressed Jul 12 00:24:40.614567 kernel: audit: type=1305 audit(1752279880.610:206): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 12 00:24:40.615192 systemd[1]: audit-rules.service: Deactivated successfully. Jul 12 00:24:40.615531 systemd[1]: Stopped audit-rules.service. Jul 12 00:24:40.610000 audit[1993]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffec6c5020 a2=420 a3=0 items=0 ppid=1 pid=1993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:24:40.620094 systemd[1]: Starting audit-rules.service... Jul 12 00:24:40.631567 kernel: audit: type=1300 audit(1752279880.610:206): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffec6c5020 a2=420 a3=0 items=0 ppid=1 pid=1993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:24:40.610000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Jul 12 00:24:40.636635 kernel: audit: type=1327 audit(1752279880.610:206): proctitle=2F7362696E2F617564697463746C002D44 Jul 12 00:24:40.613000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:40.647667 kernel: audit: type=1131 audit(1752279880.613:207): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:40.664404 augenrules[2010]: No rules Jul 12 00:24:40.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:40.665800 systemd[1]: Finished audit-rules.service. Jul 12 00:24:40.674435 sudo[1989]: pam_unix(sudo:session): session closed for user root Jul 12 00:24:40.673000 audit[1989]: USER_END pid=1989 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 12 00:24:40.683967 kernel: audit: type=1130 audit(1752279880.665:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:40.684038 kernel: audit: type=1106 audit(1752279880.673:209): pid=1989 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 12 00:24:40.684082 kernel: audit: type=1104 audit(1752279880.674:210): pid=1989 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 12 00:24:40.674000 audit[1989]: CRED_DISP pid=1989 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 12 00:24:40.697885 sshd[1986]: pam_unix(sshd:session): session closed for user core Jul 12 00:24:40.699000 audit[1986]: USER_END pid=1986 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:24:40.699000 audit[1986]: CRED_DISP pid=1986 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:24:40.723128 kernel: audit: type=1106 audit(1752279880.699:211): pid=1986 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:24:40.723236 kernel: audit: type=1104 audit(1752279880.699:212): pid=1986 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:24:40.714638 systemd[1]: sshd@5-172.31.26.167:22-147.75.109.163:58462.service: Deactivated successfully. Jul 12 00:24:40.715831 systemd[1]: session-6.scope: Deactivated successfully. Jul 12 00:24:40.716647 systemd-logind[1726]: Session 6 logged out. Waiting for processes to exit. Jul 12 00:24:40.733845 kernel: audit: type=1131 audit(1752279880.713:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.26.167:22-147.75.109.163:58462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:40.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.26.167:22-147.75.109.163:58462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:40.728346 systemd-logind[1726]: Removed session 6. Jul 12 00:24:40.730218 systemd[1]: Started sshd@6-172.31.26.167:22-147.75.109.163:58478.service. Jul 12 00:24:40.727000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.26.167:22-147.75.109.163:58478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:40.910000 audit[2016]: USER_ACCT pid=2016 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:24:40.912384 sshd[2016]: Accepted publickey for core from 147.75.109.163 port 58478 ssh2: RSA SHA256:hAayEOBHnTpwll2xPQSU8cSp7XCWn/pXChvPbqogNKA Jul 12 00:24:40.912000 audit[2016]: CRED_ACQ pid=2016 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:24:40.912000 audit[2016]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe3bc70d0 a2=3 a3=1 items=0 ppid=1 pid=2016 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:24:40.912000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 12 00:24:40.915051 sshd[2016]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 12 00:24:40.923050 systemd-logind[1726]: New session 7 of user core. Jul 12 00:24:40.924068 systemd[1]: Started session-7.scope. Jul 12 00:24:40.932000 audit[2016]: USER_START pid=2016 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:24:40.935000 audit[2018]: CRED_ACQ pid=2018 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:24:41.030000 audit[2019]: USER_ACCT pid=2019 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 12 00:24:41.032864 sudo[2019]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Jul 12 00:24:41.032000 audit[2019]: CRED_REFR pid=2019 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 12 00:24:41.034277 sudo[2019]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 12 00:24:41.035000 audit[2019]: USER_START pid=2019 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 12 00:24:41.115515 systemd[1]: Starting docker.service... Jul 12 00:24:41.239026 env[2029]: time="2025-07-12T00:24:41.238957285Z" level=info msg="Starting up" Jul 12 00:24:41.246150 env[2029]: time="2025-07-12T00:24:41.246103640Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 12 00:24:41.246325 env[2029]: time="2025-07-12T00:24:41.246295198Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 12 00:24:41.246457 env[2029]: time="2025-07-12T00:24:41.246425253Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Jul 12 00:24:41.246590 env[2029]: time="2025-07-12T00:24:41.246562963Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 12 00:24:41.250606 env[2029]: time="2025-07-12T00:24:41.250534552Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 12 00:24:41.250606 env[2029]: time="2025-07-12T00:24:41.250579683Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 12 00:24:41.250866 env[2029]: time="2025-07-12T00:24:41.250614587Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Jul 12 00:24:41.250866 env[2029]: time="2025-07-12T00:24:41.250647657Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 12 00:24:41.268978 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport904878022-merged.mount: Deactivated successfully. Jul 12 00:24:41.301021 env[2029]: time="2025-07-12T00:24:41.300820089Z" level=info msg="Loading containers: start." Jul 12 00:24:41.403000 audit[2060]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=2060 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:24:41.403000 audit[2060]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffce440e10 a2=0 a3=1 items=0 ppid=2029 pid=2060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:24:41.403000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Jul 12 00:24:41.407000 audit[2062]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2062 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:24:41.407000 audit[2062]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffdd1e0040 a2=0 a3=1 items=0 ppid=2029 pid=2062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:24:41.407000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Jul 12 00:24:41.411000 audit[2064]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=2064 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:24:41.411000 audit[2064]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=fffff5cabec0 a2=0 a3=1 items=0 ppid=2029 pid=2064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:24:41.411000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 12 00:24:41.415000 audit[2066]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=2066 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:24:41.415000 audit[2066]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=fffff432fef0 a2=0 a3=1 items=0 ppid=2029 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:24:41.415000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 12 00:24:41.421000 audit[2068]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2068 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:24:41.421000 audit[2068]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffabec110 a2=0 a3=1 items=0 ppid=2029 pid=2068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:24:41.421000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Jul 12 00:24:41.451000 audit[2073]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=2073 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:24:41.451000 audit[2073]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd1961120 a2=0 a3=1 items=0 ppid=2029 pid=2073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:24:41.451000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Jul 12 00:24:41.464000 audit[2075]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=2075 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:24:41.464000 audit[2075]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffff866a60 a2=0 a3=1 items=0 ppid=2029 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:24:41.464000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Jul 12 00:24:41.468000 audit[2077]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=2077 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:24:41.468000 audit[2077]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=fffff5cbd110 a2=0 a3=1 items=0 ppid=2029 pid=2077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:24:41.468000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Jul 12 00:24:41.472000 audit[2079]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=2079 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:24:41.472000 audit[2079]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffd5d31850 a2=0 a3=1 items=0 ppid=2029 pid=2079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:24:41.472000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 12 00:24:41.490000 audit[2083]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=2083 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:24:41.490000 audit[2083]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffcb837210 a2=0 a3=1 items=0 ppid=2029 pid=2083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:24:41.490000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 12 00:24:41.502000 audit[2084]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=2084 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:24:41.502000 audit[2084]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffc245e7e0 a2=0 a3=1 items=0 ppid=2029 pid=2084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:24:41.502000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 12 00:24:41.520741 kernel: Initializing XFRM netlink socket Jul 12 00:24:41.566421 env[2029]: time="2025-07-12T00:24:41.566238933Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Jul 12 00:24:41.569908 (udev-worker)[2040]: Network interface NamePolicy= disabled on kernel command line. Jul 12 00:24:41.609000 audit[2092]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=2092 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:24:41.609000 audit[2092]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffd61ea4e0 a2=0 a3=1 items=0 ppid=2029 pid=2092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:24:41.609000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Jul 12 00:24:41.632000 audit[2095]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=2095 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:24:41.632000 audit[2095]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffdcfaa910 a2=0 a3=1 items=0 ppid=2029 pid=2095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:24:41.632000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Jul 12 00:24:41.638000 audit[2098]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=2098 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:24:41.638000 audit[2098]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffe2245190 a2=0 a3=1 items=0 ppid=2029 pid=2098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:24:41.638000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Jul 12 00:24:41.643000 audit[2100]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=2100 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:24:41.643000 audit[2100]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffc1b81b60 a2=0 a3=1 items=0 ppid=2029 pid=2100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:24:41.643000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Jul 12 00:24:41.647000 audit[2102]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=2102 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:24:41.647000 audit[2102]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffdcf4dcf0 a2=0 a3=1 items=0 ppid=2029 pid=2102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:24:41.647000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Jul 12 00:24:41.651000 audit[2104]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=2104 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:24:41.651000 audit[2104]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffccd40b20 a2=0 a3=1 items=0 ppid=2029 pid=2104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:24:41.651000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Jul 12 00:24:41.655000 audit[2106]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=2106 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:24:41.655000 audit[2106]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=fffff93dd900 a2=0 a3=1 items=0 ppid=2029 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:24:41.655000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Jul 12 00:24:41.670000 audit[2109]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=2109 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:24:41.670000 audit[2109]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffff513be0 a2=0 a3=1 items=0 ppid=2029 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:24:41.670000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Jul 12 00:24:41.673000 audit[2111]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2111 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:24:41.673000 audit[2111]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffe59cf6a0 a2=0 a3=1 items=0 ppid=2029 pid=2111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:24:41.673000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 12 00:24:41.679000 audit[2113]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=2113 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:24:41.679000 audit[2113]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffef4c34b0 a2=0 a3=1 items=0 ppid=2029 pid=2113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:24:41.679000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 12 00:24:41.684000 audit[2115]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=2115 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:24:41.684000 audit[2115]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffffe09a2d0 a2=0 a3=1 items=0 ppid=2029 pid=2115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:24:41.684000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Jul 12 00:24:41.686548 systemd-networkd[1459]: docker0: Link UP Jul 12 00:24:41.704000 audit[2119]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=2119 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:24:41.704000 audit[2119]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc4a36170 a2=0 a3=1 items=0 ppid=2029 pid=2119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:24:41.704000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 12 00:24:41.711000 audit[2120]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=2120 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:24:41.711000 audit[2120]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=fffff7643a00 a2=0 a3=1 items=0 ppid=2029 pid=2120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:24:41.711000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 12 00:24:41.714948 env[2029]: time="2025-07-12T00:24:41.714883321Z" level=info msg="Loading containers: done." Jul 12 00:24:41.746344 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1219711667-merged.mount: Deactivated successfully. Jul 12 00:24:41.766466 env[2029]: time="2025-07-12T00:24:41.766399940Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Jul 12 00:24:41.767179 env[2029]: time="2025-07-12T00:24:41.767146104Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Jul 12 00:24:41.767540 env[2029]: time="2025-07-12T00:24:41.767514019Z" level=info msg="Daemon has completed initialization" Jul 12 00:24:41.804858 systemd[1]: Started docker.service. Jul 12 00:24:41.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:41.814527 env[2029]: time="2025-07-12T00:24:41.814441877Z" level=info msg="API listen on /run/docker.sock" Jul 12 00:24:42.941472 env[1733]: time="2025-07-12T00:24:42.941342117Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.10\"" Jul 12 00:24:43.067214 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Jul 12 00:24:43.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:43.067000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:43.067602 systemd[1]: Stopped kubelet.service. Jul 12 00:24:43.067738 systemd[1]: kubelet.service: Consumed 1.645s CPU time. Jul 12 00:24:43.070554 systemd[1]: Starting kubelet.service... Jul 12 00:24:43.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:43.459501 systemd[1]: Started kubelet.service. Jul 12 00:24:43.568398 kubelet[2154]: E0712 00:24:43.568342 2154 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 12 00:24:43.583000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 12 00:24:43.584016 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 12 00:24:43.584383 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 12 00:24:43.611343 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3936630770.mount: Deactivated successfully. Jul 12 00:24:45.494616 env[1733]: time="2025-07-12T00:24:45.494550018Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.31.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:24:45.501177 env[1733]: time="2025-07-12T00:24:45.501124867Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8907c2d36348551c1038e24ef688f6830681069380376707e55518007a20a86c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:24:45.512375 env[1733]: time="2025-07-12T00:24:45.512299950Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.31.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:24:45.518100 env[1733]: time="2025-07-12T00:24:45.518028184Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:083d7d64af31cd090f870eb49fb815e6bb42c175fc602ee9dae2f28f082bd4dc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:24:45.519946 env[1733]: time="2025-07-12T00:24:45.519888862Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.10\" returns image reference \"sha256:8907c2d36348551c1038e24ef688f6830681069380376707e55518007a20a86c\"" Jul 12 00:24:45.523255 env[1733]: time="2025-07-12T00:24:45.523203052Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.10\"" Jul 12 00:24:47.362606 env[1733]: time="2025-07-12T00:24:47.362545244Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.31.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:24:47.367105 env[1733]: time="2025-07-12T00:24:47.367030280Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0f640d6889416d515a0ac4de1c26f4d80134c47641ff464abc831560a951175f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:24:47.373063 env[1733]: time="2025-07-12T00:24:47.372986564Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.31.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:24:47.379011 env[1733]: time="2025-07-12T00:24:47.378933438Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:3c67387d023c6114879f1e817669fd641797d30f117230682faf3930ecaaf0fe,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:24:47.381453 env[1733]: time="2025-07-12T00:24:47.381392400Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.10\" returns image reference \"sha256:0f640d6889416d515a0ac4de1c26f4d80134c47641ff464abc831560a951175f\"" Jul 12 00:24:47.383492 env[1733]: time="2025-07-12T00:24:47.383427969Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.10\"" Jul 12 00:24:48.879613 env[1733]: time="2025-07-12T00:24:48.879530929Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.31.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:24:48.885372 env[1733]: time="2025-07-12T00:24:48.884943815Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:23d79b83d912e2633bcb4f9f7b8b46024893e11d492a4249d8f1f8c9a26b7b2c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:24:48.891633 env[1733]: time="2025-07-12T00:24:48.891582789Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.31.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:24:48.898049 env[1733]: time="2025-07-12T00:24:48.897963335Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:284dc2a5cf6afc9b76e39ad4b79c680c23d289488517643b28784a06d0141272,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:24:48.901001 env[1733]: time="2025-07-12T00:24:48.900923178Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.10\" returns image reference \"sha256:23d79b83d912e2633bcb4f9f7b8b46024893e11d492a4249d8f1f8c9a26b7b2c\"" Jul 12 00:24:48.903518 env[1733]: time="2025-07-12T00:24:48.903461505Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.10\"" Jul 12 00:24:50.259993 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3057872529.mount: Deactivated successfully. Jul 12 00:24:51.151598 env[1733]: time="2025-07-12T00:24:51.151515757Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:24:51.155257 env[1733]: time="2025-07-12T00:24:51.155195522Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:dde5ff0da443b455e81aefc7bf6a216fdd659d1cbe13b8e8ac8129c3ecd27f89,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:24:51.158438 env[1733]: time="2025-07-12T00:24:51.158378324Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:24:51.161455 env[1733]: time="2025-07-12T00:24:51.161390259Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:bcbb293812bdf587b28ea98369a8c347ca84884160046296761acdf12b27029d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:24:51.162515 env[1733]: time="2025-07-12T00:24:51.162461697Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.10\" returns image reference \"sha256:dde5ff0da443b455e81aefc7bf6a216fdd659d1cbe13b8e8ac8129c3ecd27f89\"" Jul 12 00:24:51.163419 env[1733]: time="2025-07-12T00:24:51.163370154Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\"" Jul 12 00:24:51.726520 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3831990053.mount: Deactivated successfully. Jul 12 00:24:53.228871 env[1733]: time="2025-07-12T00:24:53.228781517Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:24:53.240227 env[1733]: time="2025-07-12T00:24:53.240154880Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2f6c962e7b8311337352d9fdea917da2184d9919f4da7695bc2a6517cf392fe4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:24:53.244552 env[1733]: time="2025-07-12T00:24:53.244488941Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:24:53.249122 env[1733]: time="2025-07-12T00:24:53.249055008Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:9caabbf6238b189a65d0d6e6ac138de60d6a1c419e5a341fbbb7c78382559c6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:24:53.250314 env[1733]: time="2025-07-12T00:24:53.250254542Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\" returns image reference \"sha256:2f6c962e7b8311337352d9fdea917da2184d9919f4da7695bc2a6517cf392fe4\"" Jul 12 00:24:53.251518 env[1733]: time="2025-07-12T00:24:53.251468481Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" Jul 12 00:24:53.637376 kernel: kauditd_printk_skb: 88 callbacks suppressed Jul 12 00:24:53.637511 kernel: audit: type=1130 audit(1752279893.626:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:53.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:53.627032 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Jul 12 00:24:53.627454 systemd[1]: Stopped kubelet.service. Jul 12 00:24:53.648185 kernel: audit: type=1131 audit(1752279893.626:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:53.626000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:53.629997 systemd[1]: Starting kubelet.service... Jul 12 00:24:53.797554 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount129608703.mount: Deactivated successfully. Jul 12 00:24:53.813717 env[1733]: time="2025-07-12T00:24:53.812844319Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:24:53.820111 env[1733]: time="2025-07-12T00:24:53.820022943Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:afb61768ce381961ca0beff95337601f29dc70ff3ed14e5e4b3e5699057e6aa8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:24:53.823805 env[1733]: time="2025-07-12T00:24:53.823700240Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:24:53.827325 env[1733]: time="2025-07-12T00:24:53.827234897Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:24:53.828479 env[1733]: time="2025-07-12T00:24:53.828392343Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:afb61768ce381961ca0beff95337601f29dc70ff3ed14e5e4b3e5699057e6aa8\"" Jul 12 00:24:53.829509 env[1733]: time="2025-07-12T00:24:53.829205780Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\"" Jul 12 00:24:54.383045 systemd[1]: Started kubelet.service. Jul 12 00:24:54.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:54.392725 kernel: audit: type=1130 audit(1752279894.382:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:24:54.478748 kubelet[2165]: E0712 00:24:54.478634 2165 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 12 00:24:54.483502 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 12 00:24:54.483860 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 12 00:24:54.483000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 12 00:24:54.493743 kernel: audit: type=1131 audit(1752279894.483:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 12 00:24:54.664775 amazon-ssm-agent[1714]: 2025-07-12 00:24:54 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Jul 12 00:24:54.811290 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2925842458.mount: Deactivated successfully. Jul 12 00:24:57.644812 env[1733]: time="2025-07-12T00:24:57.644751844Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:24:57.648103 env[1733]: time="2025-07-12T00:24:57.648049714Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:27e3830e1402783674d8b594038967deea9d51f0d91b34c93c8f39d2f68af7da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:24:57.651704 env[1733]: time="2025-07-12T00:24:57.651623315Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:24:57.655665 env[1733]: time="2025-07-12T00:24:57.655597586Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:24:57.657818 env[1733]: time="2025-07-12T00:24:57.657765343Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\" returns image reference \"sha256:27e3830e1402783674d8b594038967deea9d51f0d91b34c93c8f39d2f68af7da\"" Jul 12 00:25:00.163000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:25:00.164201 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Jul 12 00:25:00.173728 kernel: audit: type=1131 audit(1752279900.163:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:25:00.197000 audit: BPF prog-id=43 op=UNLOAD Jul 12 00:25:00.197000 audit: BPF prog-id=42 op=UNLOAD Jul 12 00:25:00.203051 kernel: audit: type=1334 audit(1752279900.197:257): prog-id=43 op=UNLOAD Jul 12 00:25:00.203129 kernel: audit: type=1334 audit(1752279900.197:258): prog-id=42 op=UNLOAD Jul 12 00:25:00.203197 kernel: audit: type=1334 audit(1752279900.197:259): prog-id=41 op=UNLOAD Jul 12 00:25:00.197000 audit: BPF prog-id=41 op=UNLOAD Jul 12 00:25:04.627101 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Jul 12 00:25:04.627524 systemd[1]: Stopped kubelet.service. Jul 12 00:25:04.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:25:04.625000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:25:04.648524 kernel: audit: type=1130 audit(1752279904.625:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:25:04.648656 kernel: audit: type=1131 audit(1752279904.625:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:25:04.643947 systemd[1]: Starting kubelet.service... Jul 12 00:25:04.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 12 00:25:04.823888 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Jul 12 00:25:04.824087 systemd[1]: kubelet.service: Failed with result 'signal'. Jul 12 00:25:04.824632 systemd[1]: Stopped kubelet.service. Jul 12 00:25:04.836152 kernel: audit: type=1130 audit(1752279904.823:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 12 00:25:04.829547 systemd[1]: Starting kubelet.service... Jul 12 00:25:04.903260 systemd[1]: Reloading. Jul 12 00:25:05.115458 /usr/lib/systemd/system-generators/torcx-generator[2222]: time="2025-07-12T00:25:05Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Jul 12 00:25:05.115530 /usr/lib/systemd/system-generators/torcx-generator[2222]: time="2025-07-12T00:25:05Z" level=info msg="torcx already run" Jul 12 00:25:05.376534 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 12 00:25:05.376578 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 12 00:25:05.417825 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 12 00:25:05.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.602529 kernel: audit: type=1400 audit(1752279905.586:263): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.602640 kernel: audit: type=1400 audit(1752279905.586:264): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.602755 kernel: audit: type=1400 audit(1752279905.586:265): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.617924 kernel: audit: type=1400 audit(1752279905.586:266): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.618054 kernel: audit: type=1400 audit(1752279905.586:267): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.636245 kernel: audit: type=1400 audit(1752279905.586:268): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.636367 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jul 12 00:25:05.636416 kernel: audit: type=1400 audit(1752279905.586:269): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.645352 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Jul 12 00:25:05.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.654112 kernel: audit: type=1400 audit(1752279905.586:270): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.596000 audit: BPF prog-id=46 op=LOAD Jul 12 00:25:05.596000 audit: BPF prog-id=27 op=UNLOAD Jul 12 00:25:05.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.602000 audit: BPF prog-id=47 op=LOAD Jul 12 00:25:05.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.609000 audit: BPF prog-id=48 op=LOAD Jul 12 00:25:05.609000 audit: BPF prog-id=28 op=UNLOAD Jul 12 00:25:05.609000 audit: BPF prog-id=29 op=UNLOAD Jul 12 00:25:05.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.617000 audit: BPF prog-id=49 op=LOAD Jul 12 00:25:05.617000 audit: BPF prog-id=30 op=UNLOAD Jul 12 00:25:05.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.624000 audit: BPF prog-id=50 op=LOAD Jul 12 00:25:05.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.625000 audit: BPF prog-id=51 op=LOAD Jul 12 00:25:05.625000 audit: BPF prog-id=31 op=UNLOAD Jul 12 00:25:05.625000 audit: BPF prog-id=32 op=UNLOAD Jul 12 00:25:05.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.655000 audit: BPF prog-id=36 op=UNLOAD Jul 12 00:25:05.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.656000 audit: BPF prog-id=53 op=LOAD Jul 12 00:25:05.656000 audit: BPF prog-id=44 op=UNLOAD Jul 12 00:25:05.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.657000 audit: BPF prog-id=54 op=LOAD Jul 12 00:25:05.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.657000 audit: BPF prog-id=55 op=LOAD Jul 12 00:25:05.657000 audit: BPF prog-id=33 op=UNLOAD Jul 12 00:25:05.657000 audit: BPF prog-id=34 op=UNLOAD Jul 12 00:25:05.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.659000 audit: BPF prog-id=56 op=LOAD Jul 12 00:25:05.659000 audit: BPF prog-id=38 op=UNLOAD Jul 12 00:25:05.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.660000 audit: BPF prog-id=57 op=LOAD Jul 12 00:25:05.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.660000 audit: BPF prog-id=58 op=LOAD Jul 12 00:25:05.660000 audit: BPF prog-id=39 op=UNLOAD Jul 12 00:25:05.660000 audit: BPF prog-id=40 op=UNLOAD Jul 12 00:25:05.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.662000 audit: BPF prog-id=59 op=LOAD Jul 12 00:25:05.662000 audit: BPF prog-id=37 op=UNLOAD Jul 12 00:25:05.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:05.666000 audit: BPF prog-id=60 op=LOAD Jul 12 00:25:05.666000 audit: BPF prog-id=35 op=UNLOAD Jul 12 00:25:05.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:25:05.709462 systemd[1]: Stopping kubelet.service... Jul 12 00:25:05.712950 systemd[1]: kubelet.service: Deactivated successfully. Jul 12 00:25:05.713355 systemd[1]: Stopped kubelet.service. Jul 12 00:25:05.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:25:05.718252 systemd[1]: Starting kubelet.service... Jul 12 00:25:07.285978 systemd[1]: Started kubelet.service. Jul 12 00:25:07.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:25:07.363545 kubelet[2283]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 12 00:25:07.364191 kubelet[2283]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Jul 12 00:25:07.364344 kubelet[2283]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 12 00:25:07.364610 kubelet[2283]: I0712 00:25:07.364557 2283 server.go:211] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 12 00:25:09.035771 kubelet[2283]: I0712 00:25:09.035692 2283 server.go:491] "Kubelet version" kubeletVersion="v1.31.8" Jul 12 00:25:09.036498 kubelet[2283]: I0712 00:25:09.036471 2283 server.go:493] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 12 00:25:09.037126 kubelet[2283]: I0712 00:25:09.037095 2283 server.go:934] "Client rotation is on, will bootstrap in background" Jul 12 00:25:09.100998 kubelet[2283]: E0712 00:25:09.100933 2283 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://172.31.26.167:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 172.31.26.167:6443: connect: connection refused" logger="UnhandledError" Jul 12 00:25:09.103189 kubelet[2283]: I0712 00:25:09.103130 2283 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 12 00:25:09.121690 kubelet[2283]: E0712 00:25:09.121621 2283 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Jul 12 00:25:09.121862 kubelet[2283]: I0712 00:25:09.121699 2283 server.go:1408] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Jul 12 00:25:09.129602 kubelet[2283]: I0712 00:25:09.129563 2283 server.go:749] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 12 00:25:09.130503 kubelet[2283]: I0712 00:25:09.130479 2283 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Jul 12 00:25:09.130965 kubelet[2283]: I0712 00:25:09.130918 2283 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 12 00:25:09.131346 kubelet[2283]: I0712 00:25:09.131076 2283 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ip-172-31-26-167","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Jul 12 00:25:09.131735 kubelet[2283]: I0712 00:25:09.131712 2283 topology_manager.go:138] "Creating topology manager with none policy" Jul 12 00:25:09.131859 kubelet[2283]: I0712 00:25:09.131839 2283 container_manager_linux.go:300] "Creating device plugin manager" Jul 12 00:25:09.132251 kubelet[2283]: I0712 00:25:09.132231 2283 state_mem.go:36] "Initialized new in-memory state store" Jul 12 00:25:09.142131 kubelet[2283]: I0712 00:25:09.142083 2283 kubelet.go:408] "Attempting to sync node with API server" Jul 12 00:25:09.142360 kubelet[2283]: I0712 00:25:09.142336 2283 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 12 00:25:09.142495 kubelet[2283]: I0712 00:25:09.142475 2283 kubelet.go:314] "Adding apiserver pod source" Jul 12 00:25:09.142828 kubelet[2283]: I0712 00:25:09.142802 2283 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 12 00:25:09.161108 kubelet[2283]: W0712 00:25:09.161007 2283 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.31.26.167:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-26-167&limit=500&resourceVersion=0": dial tcp 172.31.26.167:6443: connect: connection refused Jul 12 00:25:09.161298 kubelet[2283]: E0712 00:25:09.161121 2283 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://172.31.26.167:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-26-167&limit=500&resourceVersion=0\": dial tcp 172.31.26.167:6443: connect: connection refused" logger="UnhandledError" Jul 12 00:25:09.161503 kubelet[2283]: I0712 00:25:09.161465 2283 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 12 00:25:09.162693 kubelet[2283]: I0712 00:25:09.162632 2283 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Jul 12 00:25:09.163075 kubelet[2283]: W0712 00:25:09.163030 2283 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Jul 12 00:25:09.166954 kubelet[2283]: I0712 00:25:09.166897 2283 server.go:1274] "Started kubelet" Jul 12 00:25:09.169302 kubelet[2283]: W0712 00:25:09.169236 2283 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.31.26.167:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 172.31.26.167:6443: connect: connection refused Jul 12 00:25:09.169608 kubelet[2283]: E0712 00:25:09.169544 2283 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://172.31.26.167:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 172.31.26.167:6443: connect: connection refused" logger="UnhandledError" Jul 12 00:25:09.170190 kubelet[2283]: I0712 00:25:09.170134 2283 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Jul 12 00:25:09.173000 audit[2283]: AVC avc: denied { mac_admin } for pid=2283 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:09.173000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 12 00:25:09.173000 audit[2283]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40005579e0 a1=4000adc618 a2=4000557980 a3=25 items=0 ppid=1 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:09.174580 kubelet[2283]: I0712 00:25:09.174397 2283 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Jul 12 00:25:09.173000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 12 00:25:09.174961 kubelet[2283]: I0712 00:25:09.174918 2283 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 12 00:25:09.174000 audit[2283]: AVC avc: denied { mac_admin } for pid=2283 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:09.174000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 12 00:25:09.174000 audit[2283]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400074cc80 a1=400089aa20 a2=4000873aa0 a3=25 items=0 ppid=1 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:09.174000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 12 00:25:09.175409 kubelet[2283]: I0712 00:25:09.174907 2283 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Jul 12 00:25:09.175409 kubelet[2283]: I0712 00:25:09.175068 2283 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Jul 12 00:25:09.175409 kubelet[2283]: I0712 00:25:09.175203 2283 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 12 00:25:09.177184 kubelet[2283]: I0712 00:25:09.177145 2283 server.go:449] "Adding debug handlers to kubelet server" Jul 12 00:25:09.181648 kubelet[2283]: E0712 00:25:09.179166 2283 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://172.31.26.167:6443/api/v1/namespaces/default/events\": dial tcp 172.31.26.167:6443: connect: connection refused" event="&Event{ObjectMeta:{ip-172-31-26-167.1851594b1cf1cbd0 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ip-172-31-26-167,UID:ip-172-31-26-167,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ip-172-31-26-167,},FirstTimestamp:2025-07-12 00:25:09.166861264 +0000 UTC m=+1.870746624,LastTimestamp:2025-07-12 00:25:09.166861264 +0000 UTC m=+1.870746624,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ip-172-31-26-167,}" Jul 12 00:25:09.180000 audit[2294]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2294 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:25:09.180000 audit[2294]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffffaa16530 a2=0 a3=1 items=0 ppid=2283 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:09.180000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 12 00:25:09.183000 audit[2295]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2295 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:25:09.183000 audit[2295]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffffafbaf0 a2=0 a3=1 items=0 ppid=2283 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:09.183000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 12 00:25:09.186393 kubelet[2283]: I0712 00:25:09.186340 2283 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Jul 12 00:25:09.188106 kubelet[2283]: I0712 00:25:09.188070 2283 volume_manager.go:289] "Starting Kubelet Volume Manager" Jul 12 00:25:09.188865 kubelet[2283]: E0712 00:25:09.188829 2283 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-26-167\" not found" Jul 12 00:25:09.191000 audit[2297]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2297 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:25:09.191000 audit[2297]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffc638ba70 a2=0 a3=1 items=0 ppid=2283 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:09.191000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 12 00:25:09.194795 kubelet[2283]: E0712 00:25:09.194694 2283 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.26.167:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-26-167?timeout=10s\": dial tcp 172.31.26.167:6443: connect: connection refused" interval="200ms" Jul 12 00:25:09.195153 kubelet[2283]: I0712 00:25:09.195107 2283 factory.go:221] Registration of the systemd container factory successfully Jul 12 00:25:09.195334 kubelet[2283]: I0712 00:25:09.195288 2283 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Jul 12 00:25:09.196646 kubelet[2283]: I0712 00:25:09.196609 2283 desired_state_of_world_populator.go:147] "Desired state populator starts to run" Jul 12 00:25:09.197047 kubelet[2283]: I0712 00:25:09.197026 2283 reconciler.go:26] "Reconciler: start to sync state" Jul 12 00:25:09.199369 kubelet[2283]: I0712 00:25:09.199315 2283 factory.go:221] Registration of the containerd container factory successfully Jul 12 00:25:09.198000 audit[2299]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2299 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:25:09.198000 audit[2299]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffef988db0 a2=0 a3=1 items=0 ppid=2283 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:09.198000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 12 00:25:09.215653 kubelet[2283]: W0712 00:25:09.215566 2283 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://172.31.26.167:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.26.167:6443: connect: connection refused Jul 12 00:25:09.215844 kubelet[2283]: E0712 00:25:09.215667 2283 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://172.31.26.167:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 172.31.26.167:6443: connect: connection refused" logger="UnhandledError" Jul 12 00:25:09.220489 kubelet[2283]: E0712 00:25:09.220432 2283 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 12 00:25:09.228000 audit[2305]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2305 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:25:09.228000 audit[2305]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffd153c3e0 a2=0 a3=1 items=0 ppid=2283 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:09.228000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Jul 12 00:25:09.232476 kubelet[2283]: I0712 00:25:09.232408 2283 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 12 00:25:09.234000 audit[2306]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=2306 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:25:09.234000 audit[2306]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc9ae2ca0 a2=0 a3=1 items=0 ppid=2283 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:09.234000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 12 00:25:09.235000 audit[2307]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=2307 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:25:09.235000 audit[2307]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdab222d0 a2=0 a3=1 items=0 ppid=2283 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:09.235000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 12 00:25:09.237723 kubelet[2283]: I0712 00:25:09.237634 2283 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 12 00:25:09.237723 kubelet[2283]: I0712 00:25:09.237717 2283 status_manager.go:217] "Starting to sync pod status with apiserver" Jul 12 00:25:09.237952 kubelet[2283]: I0712 00:25:09.237753 2283 kubelet.go:2321] "Starting kubelet main sync loop" Jul 12 00:25:09.237952 kubelet[2283]: E0712 00:25:09.237832 2283 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Jul 12 00:25:09.239000 audit[2309]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=2309 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:25:09.239000 audit[2309]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc2d94400 a2=0 a3=1 items=0 ppid=2283 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:09.239000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 12 00:25:09.241000 audit[2310]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=2310 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:25:09.241000 audit[2310]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd0bed0c0 a2=0 a3=1 items=0 ppid=2283 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:09.241000 audit[2311]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=2311 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:25:09.241000 audit[2311]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe9284cb0 a2=0 a3=1 items=0 ppid=2283 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:09.241000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 12 00:25:09.241000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 12 00:25:09.243038 kubelet[2283]: W0712 00:25:09.242954 2283 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://172.31.26.167:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.26.167:6443: connect: connection refused Jul 12 00:25:09.243188 kubelet[2283]: E0712 00:25:09.243055 2283 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://172.31.26.167:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 172.31.26.167:6443: connect: connection refused" logger="UnhandledError" Jul 12 00:25:09.244091 kubelet[2283]: I0712 00:25:09.244039 2283 cpu_manager.go:214] "Starting CPU manager" policy="none" Jul 12 00:25:09.244091 kubelet[2283]: I0712 00:25:09.244075 2283 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Jul 12 00:25:09.244278 kubelet[2283]: I0712 00:25:09.244109 2283 state_mem.go:36] "Initialized new in-memory state store" Jul 12 00:25:09.245000 audit[2312]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=2312 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:25:09.245000 audit[2312]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffd993b790 a2=0 a3=1 items=0 ppid=2283 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:09.245000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 12 00:25:09.246000 audit[2313]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=2313 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:25:09.246000 audit[2313]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc9601bb0 a2=0 a3=1 items=0 ppid=2283 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:09.246000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 12 00:25:09.249536 kubelet[2283]: I0712 00:25:09.249486 2283 policy_none.go:49] "None policy: Start" Jul 12 00:25:09.250576 kubelet[2283]: I0712 00:25:09.250542 2283 memory_manager.go:170] "Starting memorymanager" policy="None" Jul 12 00:25:09.250748 kubelet[2283]: I0712 00:25:09.250590 2283 state_mem.go:35] "Initializing new in-memory state store" Jul 12 00:25:09.261490 systemd[1]: Created slice kubepods.slice. Jul 12 00:25:09.272540 systemd[1]: Created slice kubepods-burstable.slice. Jul 12 00:25:09.280296 systemd[1]: Created slice kubepods-besteffort.slice. Jul 12 00:25:09.290000 audit[2283]: AVC avc: denied { mac_admin } for pid=2283 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:09.290000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 12 00:25:09.290000 audit[2283]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000d267b0 a1=4000adc0d8 a2=4000d26780 a3=25 items=0 ppid=1 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:09.290000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 12 00:25:09.294160 kubelet[2283]: E0712 00:25:09.289452 2283 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-26-167\" not found" Jul 12 00:25:09.294160 kubelet[2283]: I0712 00:25:09.292323 2283 manager.go:513] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 12 00:25:09.294160 kubelet[2283]: I0712 00:25:09.292738 2283 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Jul 12 00:25:09.294160 kubelet[2283]: I0712 00:25:09.293342 2283 eviction_manager.go:189] "Eviction manager: starting control loop" Jul 12 00:25:09.294160 kubelet[2283]: I0712 00:25:09.293363 2283 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Jul 12 00:25:09.294470 kubelet[2283]: I0712 00:25:09.294337 2283 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 12 00:25:09.300911 kubelet[2283]: E0712 00:25:09.300851 2283 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ip-172-31-26-167\" not found" Jul 12 00:25:09.358866 systemd[1]: Created slice kubepods-burstable-pod9cd5f4597c5437df4b1e0f9ae619193d.slice. Jul 12 00:25:09.373786 systemd[1]: Created slice kubepods-burstable-pod44a73937b5c0cd5f47a9d0a4d9267fd5.slice. Jul 12 00:25:09.389955 systemd[1]: Created slice kubepods-burstable-poda95be01496d123445976f5439afd7389.slice. Jul 12 00:25:09.395488 kubelet[2283]: E0712 00:25:09.395436 2283 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.26.167:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-26-167?timeout=10s\": dial tcp 172.31.26.167:6443: connect: connection refused" interval="400ms" Jul 12 00:25:09.397254 kubelet[2283]: I0712 00:25:09.397204 2283 kubelet_node_status.go:72] "Attempting to register node" node="ip-172-31-26-167" Jul 12 00:25:09.397987 kubelet[2283]: I0712 00:25:09.397938 2283 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/44a73937b5c0cd5f47a9d0a4d9267fd5-ca-certs\") pod \"kube-apiserver-ip-172-31-26-167\" (UID: \"44a73937b5c0cd5f47a9d0a4d9267fd5\") " pod="kube-system/kube-apiserver-ip-172-31-26-167" Jul 12 00:25:09.398118 kubelet[2283]: I0712 00:25:09.398016 2283 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/44a73937b5c0cd5f47a9d0a4d9267fd5-k8s-certs\") pod \"kube-apiserver-ip-172-31-26-167\" (UID: \"44a73937b5c0cd5f47a9d0a4d9267fd5\") " pod="kube-system/kube-apiserver-ip-172-31-26-167" Jul 12 00:25:09.398118 kubelet[2283]: I0712 00:25:09.398079 2283 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a95be01496d123445976f5439afd7389-ca-certs\") pod \"kube-controller-manager-ip-172-31-26-167\" (UID: \"a95be01496d123445976f5439afd7389\") " pod="kube-system/kube-controller-manager-ip-172-31-26-167" Jul 12 00:25:09.398239 kubelet[2283]: I0712 00:25:09.398121 2283 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a95be01496d123445976f5439afd7389-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-26-167\" (UID: \"a95be01496d123445976f5439afd7389\") " pod="kube-system/kube-controller-manager-ip-172-31-26-167" Jul 12 00:25:09.398239 kubelet[2283]: I0712 00:25:09.398188 2283 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/9cd5f4597c5437df4b1e0f9ae619193d-kubeconfig\") pod \"kube-scheduler-ip-172-31-26-167\" (UID: \"9cd5f4597c5437df4b1e0f9ae619193d\") " pod="kube-system/kube-scheduler-ip-172-31-26-167" Jul 12 00:25:09.398367 kubelet[2283]: I0712 00:25:09.398227 2283 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/44a73937b5c0cd5f47a9d0a4d9267fd5-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-26-167\" (UID: \"44a73937b5c0cd5f47a9d0a4d9267fd5\") " pod="kube-system/kube-apiserver-ip-172-31-26-167" Jul 12 00:25:09.398367 kubelet[2283]: I0712 00:25:09.398301 2283 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/a95be01496d123445976f5439afd7389-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-26-167\" (UID: \"a95be01496d123445976f5439afd7389\") " pod="kube-system/kube-controller-manager-ip-172-31-26-167" Jul 12 00:25:09.398485 kubelet[2283]: I0712 00:25:09.398364 2283 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a95be01496d123445976f5439afd7389-k8s-certs\") pod \"kube-controller-manager-ip-172-31-26-167\" (UID: \"a95be01496d123445976f5439afd7389\") " pod="kube-system/kube-controller-manager-ip-172-31-26-167" Jul 12 00:25:09.398485 kubelet[2283]: I0712 00:25:09.398401 2283 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a95be01496d123445976f5439afd7389-kubeconfig\") pod \"kube-controller-manager-ip-172-31-26-167\" (UID: \"a95be01496d123445976f5439afd7389\") " pod="kube-system/kube-controller-manager-ip-172-31-26-167" Jul 12 00:25:09.398953 kubelet[2283]: E0712 00:25:09.398916 2283 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://172.31.26.167:6443/api/v1/nodes\": dial tcp 172.31.26.167:6443: connect: connection refused" node="ip-172-31-26-167" Jul 12 00:25:09.602805 kubelet[2283]: I0712 00:25:09.601890 2283 kubelet_node_status.go:72] "Attempting to register node" node="ip-172-31-26-167" Jul 12 00:25:09.602805 kubelet[2283]: E0712 00:25:09.602633 2283 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://172.31.26.167:6443/api/v1/nodes\": dial tcp 172.31.26.167:6443: connect: connection refused" node="ip-172-31-26-167" Jul 12 00:25:09.672359 env[1733]: time="2025-07-12T00:25:09.672263188Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-26-167,Uid:9cd5f4597c5437df4b1e0f9ae619193d,Namespace:kube-system,Attempt:0,}" Jul 12 00:25:09.685849 env[1733]: time="2025-07-12T00:25:09.685787816Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-26-167,Uid:44a73937b5c0cd5f47a9d0a4d9267fd5,Namespace:kube-system,Attempt:0,}" Jul 12 00:25:09.696625 env[1733]: time="2025-07-12T00:25:09.696114374Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-26-167,Uid:a95be01496d123445976f5439afd7389,Namespace:kube-system,Attempt:0,}" Jul 12 00:25:09.797019 kubelet[2283]: E0712 00:25:09.796936 2283 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.26.167:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-26-167?timeout=10s\": dial tcp 172.31.26.167:6443: connect: connection refused" interval="800ms" Jul 12 00:25:10.005893 kubelet[2283]: I0712 00:25:10.005344 2283 kubelet_node_status.go:72] "Attempting to register node" node="ip-172-31-26-167" Jul 12 00:25:10.005893 kubelet[2283]: E0712 00:25:10.005842 2283 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://172.31.26.167:6443/api/v1/nodes\": dial tcp 172.31.26.167:6443: connect: connection refused" node="ip-172-31-26-167" Jul 12 00:25:10.068712 kubelet[2283]: W0712 00:25:10.068597 2283 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://172.31.26.167:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.26.167:6443: connect: connection refused Jul 12 00:25:10.069422 kubelet[2283]: E0712 00:25:10.069315 2283 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://172.31.26.167:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 172.31.26.167:6443: connect: connection refused" logger="UnhandledError" Jul 12 00:25:10.258992 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3934354957.mount: Deactivated successfully. Jul 12 00:25:10.278950 env[1733]: time="2025-07-12T00:25:10.278869279Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:25:10.281344 env[1733]: time="2025-07-12T00:25:10.281273203Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:25:10.287731 env[1733]: time="2025-07-12T00:25:10.287623352Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:25:10.291021 env[1733]: time="2025-07-12T00:25:10.290908643Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:25:10.293227 env[1733]: time="2025-07-12T00:25:10.293139995Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:25:10.298712 env[1733]: time="2025-07-12T00:25:10.298609593Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:25:10.301224 env[1733]: time="2025-07-12T00:25:10.301161756Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:25:10.303027 env[1733]: time="2025-07-12T00:25:10.302967429Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:25:10.305013 env[1733]: time="2025-07-12T00:25:10.304952492Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:25:10.311496 env[1733]: time="2025-07-12T00:25:10.311401856Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:25:10.313880 env[1733]: time="2025-07-12T00:25:10.313816247Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:25:10.325056 env[1733]: time="2025-07-12T00:25:10.325001625Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:25:10.392910 kubelet[2283]: W0712 00:25:10.392307 2283 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.31.26.167:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-26-167&limit=500&resourceVersion=0": dial tcp 172.31.26.167:6443: connect: connection refused Jul 12 00:25:10.392910 kubelet[2283]: E0712 00:25:10.392412 2283 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://172.31.26.167:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-26-167&limit=500&resourceVersion=0\": dial tcp 172.31.26.167:6443: connect: connection refused" logger="UnhandledError" Jul 12 00:25:10.398741 env[1733]: time="2025-07-12T00:25:10.381786148Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 12 00:25:10.398741 env[1733]: time="2025-07-12T00:25:10.381869913Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 12 00:25:10.398741 env[1733]: time="2025-07-12T00:25:10.381896898Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 12 00:25:10.398741 env[1733]: time="2025-07-12T00:25:10.382270179Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ba00b409df6b147591e3345339e2753e050577d64d9814e9c7b7217c2226862f pid=2324 runtime=io.containerd.runc.v2 Jul 12 00:25:10.411552 env[1733]: time="2025-07-12T00:25:10.411371170Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 12 00:25:10.411786 env[1733]: time="2025-07-12T00:25:10.411589766Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 12 00:25:10.411786 env[1733]: time="2025-07-12T00:25:10.411716709Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 12 00:25:10.412371 env[1733]: time="2025-07-12T00:25:10.412240450Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/17a4962b87dfb67d833a32f5247b51a23062e1df0e868ccc81d4dcc21b126a11 pid=2340 runtime=io.containerd.runc.v2 Jul 12 00:25:10.440043 env[1733]: time="2025-07-12T00:25:10.439808898Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 12 00:25:10.440043 env[1733]: time="2025-07-12T00:25:10.439896576Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 12 00:25:10.440043 env[1733]: time="2025-07-12T00:25:10.439937222Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 12 00:25:10.440385 env[1733]: time="2025-07-12T00:25:10.440317033Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bd5105fe155438019e5ed483229b70fb97df7eda06473df2dba2d28a9f8ec768 pid=2367 runtime=io.containerd.runc.v2 Jul 12 00:25:10.451946 systemd[1]: Started cri-containerd-ba00b409df6b147591e3345339e2753e050577d64d9814e9c7b7217c2226862f.scope. Jul 12 00:25:10.464086 systemd[1]: Started cri-containerd-17a4962b87dfb67d833a32f5247b51a23062e1df0e868ccc81d4dcc21b126a11.scope. Jul 12 00:25:10.518857 systemd[1]: Started cri-containerd-bd5105fe155438019e5ed483229b70fb97df7eda06473df2dba2d28a9f8ec768.scope. Jul 12 00:25:10.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.531000 audit: BPF prog-id=61 op=LOAD Jul 12 00:25:10.533000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.533000 audit[2347]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2324 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:10.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261303062343039646636623134373539316533333435333339653237 Jul 12 00:25:10.533000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.533000 audit[2347]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2324 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:10.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261303062343039646636623134373539316533333435333339653237 Jul 12 00:25:10.533000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.533000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.533000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.533000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.533000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.533000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.533000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.533000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.533000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.533000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.533000 audit: BPF prog-id=62 op=LOAD Jul 12 00:25:10.533000 audit[2347]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2324 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:10.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261303062343039646636623134373539316533333435333339653237 Jul 12 00:25:10.534000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.534000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.534000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.534000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.534000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.534000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.534000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.534000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.534000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.534000 audit: BPF prog-id=63 op=LOAD Jul 12 00:25:10.534000 audit[2347]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2324 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:10.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261303062343039646636623134373539316533333435333339653237 Jul 12 00:25:10.534000 audit: BPF prog-id=63 op=UNLOAD Jul 12 00:25:10.534000 audit: BPF prog-id=62 op=UNLOAD Jul 12 00:25:10.534000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.534000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.534000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.534000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.534000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.534000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.534000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.534000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.534000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.534000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.534000 audit: BPF prog-id=64 op=LOAD Jul 12 00:25:10.534000 audit[2347]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2324 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:10.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261303062343039646636623134373539316533333435333339653237 Jul 12 00:25:10.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.554000 audit: BPF prog-id=65 op=LOAD Jul 12 00:25:10.556000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.556000 audit[2366]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2340 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:10.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137613439363262383764666236376438333361333266353234376235 Jul 12 00:25:10.556000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.556000 audit[2366]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2340 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:10.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137613439363262383764666236376438333361333266353234376235 Jul 12 00:25:10.557000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.557000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.557000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.557000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.557000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.557000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.557000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.557000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.557000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.557000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.557000 audit: BPF prog-id=66 op=LOAD Jul 12 00:25:10.557000 audit[2366]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2340 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:10.557000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137613439363262383764666236376438333361333266353234376235 Jul 12 00:25:10.558000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.558000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.558000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.558000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.558000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.558000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.558000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.558000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.558000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.558000 audit: BPF prog-id=67 op=LOAD Jul 12 00:25:10.558000 audit[2366]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2340 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:10.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137613439363262383764666236376438333361333266353234376235 Jul 12 00:25:10.559000 audit: BPF prog-id=67 op=UNLOAD Jul 12 00:25:10.560000 audit: BPF prog-id=66 op=UNLOAD Jul 12 00:25:10.560000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.560000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.560000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.560000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.560000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.560000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.560000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.560000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.560000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.560000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.560000 audit: BPF prog-id=68 op=LOAD Jul 12 00:25:10.560000 audit[2366]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2340 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:10.560000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137613439363262383764666236376438333361333266353234376235 Jul 12 00:25:10.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.584000 audit: BPF prog-id=69 op=LOAD Jul 12 00:25:10.587000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.589986 kernel: kauditd_printk_skb: 350 callbacks suppressed Jul 12 00:25:10.590140 kernel: audit: type=1400 audit(1752279910.587:494): avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.598357 kubelet[2283]: E0712 00:25:10.598275 2283 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.26.167:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-26-167?timeout=10s\": dial tcp 172.31.26.167:6443: connect: connection refused" interval="1.6s" Jul 12 00:25:10.587000 audit[2387]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2367 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:10.613560 kernel: audit: type=1300 audit(1752279910.587:494): arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2367 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:10.628396 kernel: audit: type=1327 audit(1752279910.587:494): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264353130356665313535343338303139653565643438333232396237 Jul 12 00:25:10.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264353130356665313535343338303139653565643438333232396237 Jul 12 00:25:10.650832 kernel: audit: type=1400 audit(1752279910.587:495): avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.587000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.664646 kernel: audit: type=1300 audit(1752279910.587:495): arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2367 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:10.587000 audit[2387]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2367 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:10.673757 env[1733]: time="2025-07-12T00:25:10.673670350Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-26-167,Uid:a95be01496d123445976f5439afd7389,Namespace:kube-system,Attempt:0,} returns sandbox id \"ba00b409df6b147591e3345339e2753e050577d64d9814e9c7b7217c2226862f\"" Jul 12 00:25:10.686720 kernel: audit: type=1327 audit(1752279910.587:495): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264353130356665313535343338303139653565643438333232396237 Jul 12 00:25:10.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264353130356665313535343338303139653565643438333232396237 Jul 12 00:25:10.686911 env[1733]: time="2025-07-12T00:25:10.684391096Z" level=info msg="CreateContainer within sandbox \"ba00b409df6b147591e3345339e2753e050577d64d9814e9c7b7217c2226862f\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Jul 12 00:25:10.686911 env[1733]: time="2025-07-12T00:25:10.684986153Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-26-167,Uid:9cd5f4597c5437df4b1e0f9ae619193d,Namespace:kube-system,Attempt:0,} returns sandbox id \"17a4962b87dfb67d833a32f5247b51a23062e1df0e868ccc81d4dcc21b126a11\"" Jul 12 00:25:10.597000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.702499 kubelet[2283]: W0712 00:25:10.695206 2283 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.31.26.167:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 172.31.26.167:6443: connect: connection refused Jul 12 00:25:10.702499 kubelet[2283]: E0712 00:25:10.695310 2283 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://172.31.26.167:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 172.31.26.167:6443: connect: connection refused" logger="UnhandledError" Jul 12 00:25:10.704219 env[1733]: time="2025-07-12T00:25:10.703913031Z" level=info msg="CreateContainer within sandbox \"17a4962b87dfb67d833a32f5247b51a23062e1df0e868ccc81d4dcc21b126a11\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Jul 12 00:25:10.713875 kernel: audit: type=1400 audit(1752279910.597:496): avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.714019 kernel: audit: type=1400 audit(1752279910.597:496): avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.597000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.723439 kernel: audit: type=1400 audit(1752279910.597:496): avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.597000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.597000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.733772 kernel: audit: type=1400 audit(1752279910.597:496): avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.597000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.597000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.597000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.597000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.597000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.597000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.597000 audit: BPF prog-id=70 op=LOAD Jul 12 00:25:10.597000 audit[2387]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2367 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:10.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264353130356665313535343338303139653565643438333232396237 Jul 12 00:25:10.598000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.598000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.598000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.598000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.598000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.598000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.598000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.598000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.598000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.598000 audit: BPF prog-id=71 op=LOAD Jul 12 00:25:10.598000 audit[2387]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2367 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:10.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264353130356665313535343338303139653565643438333232396237 Jul 12 00:25:10.600000 audit: BPF prog-id=71 op=UNLOAD Jul 12 00:25:10.600000 audit: BPF prog-id=70 op=UNLOAD Jul 12 00:25:10.600000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.600000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.600000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.600000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.600000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.600000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.600000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.600000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.600000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.600000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.600000 audit: BPF prog-id=72 op=LOAD Jul 12 00:25:10.600000 audit[2387]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2367 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:10.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264353130356665313535343338303139653565643438333232396237 Jul 12 00:25:10.741393 env[1733]: time="2025-07-12T00:25:10.741318012Z" level=info msg="CreateContainer within sandbox \"ba00b409df6b147591e3345339e2753e050577d64d9814e9c7b7217c2226862f\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"ad6611a8d3b468e05bdcf79dfb454adde7fbb9af873d12d9929bebb4f160e035\"" Jul 12 00:25:10.742807 env[1733]: time="2025-07-12T00:25:10.742724716Z" level=info msg="StartContainer for \"ad6611a8d3b468e05bdcf79dfb454adde7fbb9af873d12d9929bebb4f160e035\"" Jul 12 00:25:10.753040 env[1733]: time="2025-07-12T00:25:10.752984900Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-26-167,Uid:44a73937b5c0cd5f47a9d0a4d9267fd5,Namespace:kube-system,Attempt:0,} returns sandbox id \"bd5105fe155438019e5ed483229b70fb97df7eda06473df2dba2d28a9f8ec768\"" Jul 12 00:25:10.759794 env[1733]: time="2025-07-12T00:25:10.759663362Z" level=info msg="CreateContainer within sandbox \"bd5105fe155438019e5ed483229b70fb97df7eda06473df2dba2d28a9f8ec768\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Jul 12 00:25:10.765067 env[1733]: time="2025-07-12T00:25:10.764983629Z" level=info msg="CreateContainer within sandbox \"17a4962b87dfb67d833a32f5247b51a23062e1df0e868ccc81d4dcc21b126a11\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"36b93d5d0d3f1756bc0de69f371b14450a878df2d5b7eed2b8b12a23489e6bfb\"" Jul 12 00:25:10.765952 env[1733]: time="2025-07-12T00:25:10.765904010Z" level=info msg="StartContainer for \"36b93d5d0d3f1756bc0de69f371b14450a878df2d5b7eed2b8b12a23489e6bfb\"" Jul 12 00:25:10.783333 kubelet[2283]: W0712 00:25:10.777121 2283 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://172.31.26.167:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.26.167:6443: connect: connection refused Jul 12 00:25:10.783333 kubelet[2283]: E0712 00:25:10.777239 2283 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://172.31.26.167:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 172.31.26.167:6443: connect: connection refused" logger="UnhandledError" Jul 12 00:25:10.797091 env[1733]: time="2025-07-12T00:25:10.796998636Z" level=info msg="CreateContainer within sandbox \"bd5105fe155438019e5ed483229b70fb97df7eda06473df2dba2d28a9f8ec768\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"0206b22f8dacc24cb844615a3d4e0758ed7e414243f8c107473dd7c5514d939d\"" Jul 12 00:25:10.799763 env[1733]: time="2025-07-12T00:25:10.799702843Z" level=info msg="StartContainer for \"0206b22f8dacc24cb844615a3d4e0758ed7e414243f8c107473dd7c5514d939d\"" Jul 12 00:25:10.806797 systemd[1]: Started cri-containerd-ad6611a8d3b468e05bdcf79dfb454adde7fbb9af873d12d9929bebb4f160e035.scope. Jul 12 00:25:10.817479 kubelet[2283]: I0712 00:25:10.817409 2283 kubelet_node_status.go:72] "Attempting to register node" node="ip-172-31-26-167" Jul 12 00:25:10.818034 kubelet[2283]: E0712 00:25:10.817974 2283 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://172.31.26.167:6443/api/v1/nodes\": dial tcp 172.31.26.167:6443: connect: connection refused" node="ip-172-31-26-167" Jul 12 00:25:10.851115 systemd[1]: Started cri-containerd-36b93d5d0d3f1756bc0de69f371b14450a878df2d5b7eed2b8b12a23489e6bfb.scope. Jul 12 00:25:10.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.872000 audit: BPF prog-id=73 op=LOAD Jul 12 00:25:10.874000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.874000 audit[2456]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400019db38 a2=10 a3=0 items=0 ppid=2324 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:10.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164363631316138643362343638653035626463663739646662343534 Jul 12 00:25:10.875000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.875000 audit[2456]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400019d5a0 a2=3c a3=0 items=0 ppid=2324 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:10.875000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164363631316138643362343638653035626463663739646662343534 Jul 12 00:25:10.875000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.875000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.875000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.875000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.875000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.875000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.875000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.875000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.875000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.875000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.875000 audit: BPF prog-id=74 op=LOAD Jul 12 00:25:10.875000 audit[2456]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400019d8e0 a2=78 a3=0 items=0 ppid=2324 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:10.875000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164363631316138643362343638653035626463663739646662343534 Jul 12 00:25:10.878000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.878000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.878000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.878000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.878000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.878000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.878000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.878000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.878000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.878000 audit: BPF prog-id=75 op=LOAD Jul 12 00:25:10.878000 audit[2456]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400019d670 a2=78 a3=0 items=0 ppid=2324 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:10.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164363631316138643362343638653035626463663739646662343534 Jul 12 00:25:10.880000 audit: BPF prog-id=75 op=UNLOAD Jul 12 00:25:10.880000 audit: BPF prog-id=74 op=UNLOAD Jul 12 00:25:10.880000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.880000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.880000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.880000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.880000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.880000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.880000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.880000 audit[2456]: AVC avc: denied { perfmon } for pid=2456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.880000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.880000 audit[2456]: AVC avc: denied { bpf } for pid=2456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.880000 audit: BPF prog-id=76 op=LOAD Jul 12 00:25:10.880000 audit[2456]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400019db40 a2=78 a3=0 items=0 ppid=2324 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:10.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164363631316138643362343638653035626463663739646662343534 Jul 12 00:25:10.904929 systemd[1]: Started cri-containerd-0206b22f8dacc24cb844615a3d4e0758ed7e414243f8c107473dd7c5514d939d.scope. Jul 12 00:25:10.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.911000 audit: BPF prog-id=77 op=LOAD Jul 12 00:25:10.913000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.913000 audit[2472]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=2340 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:10.913000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336623933643564306433663137353662633064653639663337316231 Jul 12 00:25:10.913000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.913000 audit[2472]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=2340 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:10.913000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336623933643564306433663137353662633064653639663337316231 Jul 12 00:25:10.914000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.914000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.914000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.914000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.914000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.914000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.914000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.914000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.914000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.914000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.914000 audit: BPF prog-id=78 op=LOAD Jul 12 00:25:10.914000 audit[2472]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=2340 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:10.914000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336623933643564306433663137353662633064653639663337316231 Jul 12 00:25:10.917000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.917000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.917000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.917000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.917000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.917000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.917000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.917000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.917000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.917000 audit: BPF prog-id=79 op=LOAD Jul 12 00:25:10.917000 audit[2472]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=2340 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:10.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336623933643564306433663137353662633064653639663337316231 Jul 12 00:25:10.918000 audit: BPF prog-id=79 op=UNLOAD Jul 12 00:25:10.918000 audit: BPF prog-id=78 op=UNLOAD Jul 12 00:25:10.920000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.920000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.920000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.920000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.920000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.920000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.920000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.920000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.920000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.920000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.920000 audit: BPF prog-id=80 op=LOAD Jul 12 00:25:10.920000 audit[2472]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=2340 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:10.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336623933643564306433663137353662633064653639663337316231 Jul 12 00:25:10.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.975000 audit: BPF prog-id=81 op=LOAD Jul 12 00:25:10.982000 audit[2499]: AVC avc: denied { bpf } for pid=2499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.982000 audit[2499]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2367 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:10.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032303662323266386461636332346362383434363135613364346530 Jul 12 00:25:10.983000 audit[2499]: AVC avc: denied { perfmon } for pid=2499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.983000 audit[2499]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2367 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:10.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032303662323266386461636332346362383434363135613364346530 Jul 12 00:25:10.983000 audit[2499]: AVC avc: denied { bpf } for pid=2499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.983000 audit[2499]: AVC avc: denied { bpf } for pid=2499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.983000 audit[2499]: AVC avc: denied { bpf } for pid=2499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.983000 audit[2499]: AVC avc: denied { perfmon } for pid=2499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.983000 audit[2499]: AVC avc: denied { perfmon } for pid=2499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.983000 audit[2499]: AVC avc: denied { perfmon } for pid=2499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.983000 audit[2499]: AVC avc: denied { perfmon } for pid=2499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.983000 audit[2499]: AVC avc: denied { perfmon } for pid=2499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.983000 audit[2499]: AVC avc: denied { bpf } for pid=2499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.983000 audit[2499]: AVC avc: denied { bpf } for pid=2499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.983000 audit: BPF prog-id=82 op=LOAD Jul 12 00:25:10.983000 audit[2499]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2367 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:10.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032303662323266386461636332346362383434363135613364346530 Jul 12 00:25:10.984000 audit[2499]: AVC avc: denied { bpf } for pid=2499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.984000 audit[2499]: AVC avc: denied { bpf } for pid=2499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.984000 audit[2499]: AVC avc: denied { perfmon } for pid=2499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.984000 audit[2499]: AVC avc: denied { perfmon } for pid=2499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.991230 env[1733]: time="2025-07-12T00:25:10.991171668Z" level=info msg="StartContainer for \"ad6611a8d3b468e05bdcf79dfb454adde7fbb9af873d12d9929bebb4f160e035\" returns successfully" Jul 12 00:25:10.984000 audit[2499]: AVC avc: denied { perfmon } for pid=2499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.984000 audit[2499]: AVC avc: denied { perfmon } for pid=2499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.984000 audit[2499]: AVC avc: denied { perfmon } for pid=2499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.984000 audit[2499]: AVC avc: denied { bpf } for pid=2499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.984000 audit[2499]: AVC avc: denied { bpf } for pid=2499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.984000 audit: BPF prog-id=83 op=LOAD Jul 12 00:25:10.984000 audit[2499]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2367 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:10.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032303662323266386461636332346362383434363135613364346530 Jul 12 00:25:10.992000 audit: BPF prog-id=83 op=UNLOAD Jul 12 00:25:10.992000 audit: BPF prog-id=82 op=UNLOAD Jul 12 00:25:10.992000 audit[2499]: AVC avc: denied { bpf } for pid=2499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.992000 audit[2499]: AVC avc: denied { bpf } for pid=2499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.992000 audit[2499]: AVC avc: denied { bpf } for pid=2499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.992000 audit[2499]: AVC avc: denied { perfmon } for pid=2499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.992000 audit[2499]: AVC avc: denied { perfmon } for pid=2499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.992000 audit[2499]: AVC avc: denied { perfmon } for pid=2499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.992000 audit[2499]: AVC avc: denied { perfmon } for pid=2499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.992000 audit[2499]: AVC avc: denied { perfmon } for pid=2499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.992000 audit[2499]: AVC avc: denied { bpf } for pid=2499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.992000 audit[2499]: AVC avc: denied { bpf } for pid=2499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:10.992000 audit: BPF prog-id=84 op=LOAD Jul 12 00:25:10.992000 audit[2499]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2367 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:10.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032303662323266386461636332346362383434363135613364346530 Jul 12 00:25:11.035511 env[1733]: time="2025-07-12T00:25:11.035342943Z" level=info msg="StartContainer for \"36b93d5d0d3f1756bc0de69f371b14450a878df2d5b7eed2b8b12a23489e6bfb\" returns successfully" Jul 12 00:25:11.057674 kubelet[2283]: E0712 00:25:11.057452 2283 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://172.31.26.167:6443/api/v1/namespaces/default/events\": dial tcp 172.31.26.167:6443: connect: connection refused" event="&Event{ObjectMeta:{ip-172-31-26-167.1851594b1cf1cbd0 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ip-172-31-26-167,UID:ip-172-31-26-167,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ip-172-31-26-167,},FirstTimestamp:2025-07-12 00:25:09.166861264 +0000 UTC m=+1.870746624,LastTimestamp:2025-07-12 00:25:09.166861264 +0000 UTC m=+1.870746624,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ip-172-31-26-167,}" Jul 12 00:25:11.091057 env[1733]: time="2025-07-12T00:25:11.090988233Z" level=info msg="StartContainer for \"0206b22f8dacc24cb844615a3d4e0758ed7e414243f8c107473dd7c5514d939d\" returns successfully" Jul 12 00:25:11.226911 kubelet[2283]: E0712 00:25:11.226844 2283 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://172.31.26.167:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 172.31.26.167:6443: connect: connection refused" logger="UnhandledError" Jul 12 00:25:12.420561 kubelet[2283]: I0712 00:25:12.420524 2283 kubelet_node_status.go:72] "Attempting to register node" node="ip-172-31-26-167" Jul 12 00:25:14.355912 update_engine[1727]: I0712 00:25:14.355832 1727 update_attempter.cc:509] Updating boot flags... Jul 12 00:25:15.090000 audit[2517]: AVC avc: denied { watch } for pid=2517 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=7348 scontext=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:25:15.090000 audit[2517]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=400884dd40 a2=fc6 a3=0 items=0 ppid=2367 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 key=(null) Jul 12 00:25:15.090000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 12 00:25:15.090000 audit[2517]: AVC avc: denied { watch } for pid=2517 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=7346 scontext=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:25:15.090000 audit[2517]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=400884dda0 a2=fc6 a3=0 items=0 ppid=2367 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 key=(null) Jul 12 00:25:15.090000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 12 00:25:15.096000 audit[2517]: AVC avc: denied { watch } for pid=2517 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=7350 scontext=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:25:15.096000 audit[2517]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4a a1=4004955350 a2=fc6 a3=0 items=0 ppid=2367 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 key=(null) Jul 12 00:25:15.096000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 12 00:25:15.114000 audit[2517]: AVC avc: denied { watch } for pid=2517 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7344 scontext=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:25:15.114000 audit[2517]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5a a1=40000759c0 a2=fc6 a3=0 items=0 ppid=2367 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 key=(null) Jul 12 00:25:15.114000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 12 00:25:15.128000 audit[2517]: AVC avc: denied { watch } for pid=2517 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7344 scontext=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:25:15.128000 audit[2517]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=67 a1=4004eeaa60 a2=fc6 a3=0 items=0 ppid=2367 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 key=(null) Jul 12 00:25:15.128000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 12 00:25:15.129000 audit[2517]: AVC avc: denied { watch } for pid=2517 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=7348 scontext=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:25:15.129000 audit[2517]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=67 a1=4004da6000 a2=fc6 a3=0 items=0 ppid=2367 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 key=(null) Jul 12 00:25:15.129000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 12 00:25:15.355000 audit[2485]: AVC avc: denied { watch } for pid=2485 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=7348 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:25:15.355000 audit[2485]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=4000054930 a2=fc6 a3=0 items=0 ppid=2324 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c411 key=(null) Jul 12 00:25:15.355000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 12 00:25:15.367000 audit[2485]: AVC avc: denied { watch } for pid=2485 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7344 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:25:15.367000 audit[2485]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=400028d3a0 a2=fc6 a3=0 items=0 ppid=2324 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c411 key=(null) Jul 12 00:25:15.367000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 12 00:25:15.517829 kubelet[2283]: E0712 00:25:15.517782 2283 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ip-172-31-26-167\" not found" node="ip-172-31-26-167" Jul 12 00:25:15.563521 kubelet[2283]: I0712 00:25:15.563476 2283 kubelet_node_status.go:75] "Successfully registered node" node="ip-172-31-26-167" Jul 12 00:25:16.173525 kubelet[2283]: I0712 00:25:16.173487 2283 apiserver.go:52] "Watching apiserver" Jul 12 00:25:16.197643 kubelet[2283]: I0712 00:25:16.197598 2283 desired_state_of_world_populator.go:155] "Finished populating initial desired state of world" Jul 12 00:25:17.797078 systemd[1]: Reloading. Jul 12 00:25:17.935807 /usr/lib/systemd/system-generators/torcx-generator[2681]: time="2025-07-12T00:25:17Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Jul 12 00:25:17.938912 /usr/lib/systemd/system-generators/torcx-generator[2681]: time="2025-07-12T00:25:17Z" level=info msg="torcx already run" Jul 12 00:25:18.118051 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 12 00:25:18.118089 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 12 00:25:18.158224 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 12 00:25:18.379322 kernel: kauditd_printk_skb: 231 callbacks suppressed Jul 12 00:25:18.379440 kernel: audit: type=1400 audit(1752279918.369:563): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.387917 kernel: audit: type=1400 audit(1752279918.369:564): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.395859 kernel: audit: type=1400 audit(1752279918.369:565): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.403718 kernel: audit: type=1400 audit(1752279918.369:566): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.411744 kernel: audit: type=1400 audit(1752279918.369:567): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.411810 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jul 12 00:25:18.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.421531 kernel: audit: type=1400 audit(1752279918.369:568): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.421608 kernel: audit: audit_lost=7 audit_rate_limit=0 audit_backlog_limit=64 Jul 12 00:25:18.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.431664 kernel: audit: type=1400 audit(1752279918.369:569): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.431798 kernel: audit: backlog limit exceeded Jul 12 00:25:18.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.371000 audit: BPF prog-id=85 op=LOAD Jul 12 00:25:18.371000 audit: BPF prog-id=69 op=UNLOAD Jul 12 00:25:18.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.380000 audit: BPF prog-id=86 op=LOAD Jul 12 00:25:18.380000 audit: BPF prog-id=46 op=UNLOAD Jul 12 00:25:18.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.387000 audit: BPF prog-id=87 op=LOAD Jul 12 00:25:18.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.387000 audit: BPF prog-id=88 op=LOAD Jul 12 00:25:18.387000 audit: BPF prog-id=47 op=UNLOAD Jul 12 00:25:18.387000 audit: BPF prog-id=48 op=UNLOAD Jul 12 00:25:18.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.395000 audit: BPF prog-id=89 op=LOAD Jul 12 00:25:18.395000 audit: BPF prog-id=61 op=UNLOAD Jul 12 00:25:18.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.403000 audit: BPF prog-id=90 op=LOAD Jul 12 00:25:18.403000 audit: BPF prog-id=77 op=UNLOAD Jul 12 00:25:18.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.432000 audit: BPF prog-id=91 op=LOAD Jul 12 00:25:18.432000 audit: BPF prog-id=81 op=UNLOAD Jul 12 00:25:18.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.434000 audit: BPF prog-id=92 op=LOAD Jul 12 00:25:18.434000 audit: BPF prog-id=49 op=UNLOAD Jul 12 00:25:18.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.434000 audit: BPF prog-id=93 op=LOAD Jul 12 00:25:18.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.434000 audit: BPF prog-id=94 op=LOAD Jul 12 00:25:18.434000 audit: BPF prog-id=50 op=UNLOAD Jul 12 00:25:18.435000 audit: BPF prog-id=51 op=UNLOAD Jul 12 00:25:18.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.437000 audit: BPF prog-id=95 op=LOAD Jul 12 00:25:18.437000 audit: BPF prog-id=52 op=UNLOAD Jul 12 00:25:18.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.440000 audit: BPF prog-id=96 op=LOAD Jul 12 00:25:18.440000 audit: BPF prog-id=53 op=UNLOAD Jul 12 00:25:18.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.441000 audit: BPF prog-id=97 op=LOAD Jul 12 00:25:18.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.441000 audit: BPF prog-id=98 op=LOAD Jul 12 00:25:18.441000 audit: BPF prog-id=54 op=UNLOAD Jul 12 00:25:18.441000 audit: BPF prog-id=55 op=UNLOAD Jul 12 00:25:18.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.443000 audit: BPF prog-id=99 op=LOAD Jul 12 00:25:18.443000 audit: BPF prog-id=56 op=UNLOAD Jul 12 00:25:18.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.444000 audit: BPF prog-id=100 op=LOAD Jul 12 00:25:18.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.444000 audit: BPF prog-id=101 op=LOAD Jul 12 00:25:18.444000 audit: BPF prog-id=57 op=UNLOAD Jul 12 00:25:18.444000 audit: BPF prog-id=58 op=UNLOAD Jul 12 00:25:18.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.446000 audit: BPF prog-id=102 op=LOAD Jul 12 00:25:18.446000 audit: BPF prog-id=59 op=UNLOAD Jul 12 00:25:18.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.450000 audit: BPF prog-id=103 op=LOAD Jul 12 00:25:18.450000 audit: BPF prog-id=65 op=UNLOAD Jul 12 00:25:18.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.452000 audit: BPF prog-id=104 op=LOAD Jul 12 00:25:18.452000 audit: BPF prog-id=60 op=UNLOAD Jul 12 00:25:18.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:18.453000 audit: BPF prog-id=105 op=LOAD Jul 12 00:25:18.453000 audit: BPF prog-id=73 op=UNLOAD Jul 12 00:25:18.483158 systemd[1]: Stopping kubelet.service... Jul 12 00:25:18.513428 systemd[1]: kubelet.service: Deactivated successfully. Jul 12 00:25:18.513852 systemd[1]: Stopped kubelet.service. Jul 12 00:25:18.513952 systemd[1]: kubelet.service: Consumed 2.591s CPU time. Jul 12 00:25:18.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:25:18.517329 systemd[1]: Starting kubelet.service... Jul 12 00:25:18.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:25:18.847581 systemd[1]: Started kubelet.service. Jul 12 00:25:18.963759 kubelet[2742]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 12 00:25:18.963759 kubelet[2742]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Jul 12 00:25:18.963759 kubelet[2742]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 12 00:25:18.963759 kubelet[2742]: I0712 00:25:18.963532 2742 server.go:211] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 12 00:25:18.988596 kubelet[2742]: I0712 00:25:18.988511 2742 server.go:491] "Kubelet version" kubeletVersion="v1.31.8" Jul 12 00:25:18.989097 kubelet[2742]: I0712 00:25:18.989061 2742 server.go:493] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 12 00:25:18.989820 kubelet[2742]: I0712 00:25:18.989774 2742 server.go:934] "Client rotation is on, will bootstrap in background" Jul 12 00:25:18.992820 kubelet[2742]: I0712 00:25:18.992594 2742 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Jul 12 00:25:18.998411 kubelet[2742]: I0712 00:25:18.998349 2742 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 12 00:25:19.009075 kubelet[2742]: E0712 00:25:19.009024 2742 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Jul 12 00:25:19.009346 kubelet[2742]: I0712 00:25:19.009320 2742 server.go:1408] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Jul 12 00:25:19.014308 kubelet[2742]: I0712 00:25:19.014242 2742 server.go:749] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 12 00:25:19.014727 kubelet[2742]: I0712 00:25:19.014663 2742 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Jul 12 00:25:19.015100 kubelet[2742]: I0712 00:25:19.015046 2742 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 12 00:25:19.015514 kubelet[2742]: I0712 00:25:19.015235 2742 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ip-172-31-26-167","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Jul 12 00:25:19.015833 kubelet[2742]: I0712 00:25:19.015810 2742 topology_manager.go:138] "Creating topology manager with none policy" Jul 12 00:25:19.015963 kubelet[2742]: I0712 00:25:19.015943 2742 container_manager_linux.go:300] "Creating device plugin manager" Jul 12 00:25:19.016117 kubelet[2742]: I0712 00:25:19.016096 2742 state_mem.go:36] "Initialized new in-memory state store" Jul 12 00:25:19.016381 kubelet[2742]: I0712 00:25:19.016363 2742 kubelet.go:408] "Attempting to sync node with API server" Jul 12 00:25:19.034457 kubelet[2742]: I0712 00:25:19.034416 2742 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 12 00:25:19.034708 kubelet[2742]: I0712 00:25:19.034663 2742 kubelet.go:314] "Adding apiserver pod source" Jul 12 00:25:19.034849 kubelet[2742]: I0712 00:25:19.034828 2742 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 12 00:25:19.042920 kubelet[2742]: I0712 00:25:19.042883 2742 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 12 00:25:19.043968 kubelet[2742]: I0712 00:25:19.043937 2742 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Jul 12 00:25:19.044861 kubelet[2742]: I0712 00:25:19.044823 2742 server.go:1274] "Started kubelet" Jul 12 00:25:19.050101 kubelet[2742]: I0712 00:25:19.050050 2742 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Jul 12 00:25:19.049000 audit[2742]: AVC avc: denied { mac_admin } for pid=2742 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:19.049000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 12 00:25:19.049000 audit[2742]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400062df50 a1=4000a6ae70 a2=400062def0 a3=25 items=0 ppid=1 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:19.049000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 12 00:25:19.049000 audit[2742]: AVC avc: denied { mac_admin } for pid=2742 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:19.049000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 12 00:25:19.049000 audit[2742]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000854e20 a1=4000a6ae88 a2=4000378b40 a3=25 items=0 ppid=1 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:19.049000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 12 00:25:19.051136 kubelet[2742]: I0712 00:25:19.051086 2742 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Jul 12 00:25:19.051308 kubelet[2742]: I0712 00:25:19.051286 2742 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 12 00:25:19.065898 kubelet[2742]: I0712 00:25:19.065843 2742 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Jul 12 00:25:19.096445 kubelet[2742]: I0712 00:25:19.066119 2742 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Jul 12 00:25:19.096975 kubelet[2742]: I0712 00:25:19.096946 2742 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 12 00:25:19.097162 kubelet[2742]: I0712 00:25:19.076565 2742 volume_manager.go:289] "Starting Kubelet Volume Manager" Jul 12 00:25:19.097404 kubelet[2742]: I0712 00:25:19.069627 2742 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Jul 12 00:25:19.098071 kubelet[2742]: I0712 00:25:19.076588 2742 desired_state_of_world_populator.go:147] "Desired state populator starts to run" Jul 12 00:25:19.103762 kubelet[2742]: I0712 00:25:19.098505 2742 reconciler.go:26] "Reconciler: start to sync state" Jul 12 00:25:19.116911 kubelet[2742]: E0712 00:25:19.076841 2742 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-26-167\" not found" Jul 12 00:25:19.117822 kubelet[2742]: I0712 00:25:19.116698 2742 server.go:449] "Adding debug handlers to kubelet server" Jul 12 00:25:19.123554 kubelet[2742]: I0712 00:25:19.118599 2742 factory.go:221] Registration of the systemd container factory successfully Jul 12 00:25:19.129618 kubelet[2742]: I0712 00:25:19.129573 2742 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Jul 12 00:25:19.135961 kubelet[2742]: I0712 00:25:19.135908 2742 factory.go:221] Registration of the containerd container factory successfully Jul 12 00:25:19.137192 kubelet[2742]: E0712 00:25:19.137152 2742 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 12 00:25:19.166544 kubelet[2742]: I0712 00:25:19.166491 2742 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 12 00:25:19.173618 kubelet[2742]: I0712 00:25:19.173574 2742 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 12 00:25:19.173989 kubelet[2742]: I0712 00:25:19.173964 2742 status_manager.go:217] "Starting to sync pod status with apiserver" Jul 12 00:25:19.174280 kubelet[2742]: I0712 00:25:19.174218 2742 kubelet.go:2321] "Starting kubelet main sync loop" Jul 12 00:25:19.174493 kubelet[2742]: E0712 00:25:19.174460 2742 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Jul 12 00:25:19.208000 audit[2485]: AVC avc: denied { watch } for pid=2485 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7344 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:25:19.208000 audit[2485]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=4000a76880 a2=fc6 a3=0 items=0 ppid=2324 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c411 key=(null) Jul 12 00:25:19.208000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 12 00:25:19.212000 audit[2485]: AVC avc: denied { watch } for pid=2485 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7344 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:25:19.212000 audit[2485]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=4000a76a40 a2=fc6 a3=0 items=0 ppid=2324 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c411 key=(null) Jul 12 00:25:19.212000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 12 00:25:19.214000 audit[2485]: AVC avc: denied { watch } for pid=2485 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7344 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:25:19.214000 audit[2485]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000a76c00 a2=fc6 a3=0 items=0 ppid=2324 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c411 key=(null) Jul 12 00:25:19.214000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 12 00:25:19.218000 audit[2485]: AVC avc: denied { watch } for pid=2485 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7344 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:25:19.218000 audit[2485]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=4000948060 a2=fc6 a3=0 items=0 ppid=2324 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c411 key=(null) Jul 12 00:25:19.218000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 12 00:25:19.275916 kubelet[2742]: E0712 00:25:19.275856 2742 kubelet.go:2345] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Jul 12 00:25:19.339312 kubelet[2742]: I0712 00:25:19.339245 2742 cpu_manager.go:214] "Starting CPU manager" policy="none" Jul 12 00:25:19.339312 kubelet[2742]: I0712 00:25:19.339281 2742 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Jul 12 00:25:19.339312 kubelet[2742]: I0712 00:25:19.339317 2742 state_mem.go:36] "Initialized new in-memory state store" Jul 12 00:25:19.339731 kubelet[2742]: I0712 00:25:19.339576 2742 state_mem.go:88] "Updated default CPUSet" cpuSet="" Jul 12 00:25:19.339731 kubelet[2742]: I0712 00:25:19.339610 2742 state_mem.go:96] "Updated CPUSet assignments" assignments={} Jul 12 00:25:19.339731 kubelet[2742]: I0712 00:25:19.339649 2742 policy_none.go:49] "None policy: Start" Jul 12 00:25:19.344041 kubelet[2742]: I0712 00:25:19.344003 2742 memory_manager.go:170] "Starting memorymanager" policy="None" Jul 12 00:25:19.344279 kubelet[2742]: I0712 00:25:19.344255 2742 state_mem.go:35] "Initializing new in-memory state store" Jul 12 00:25:19.344920 kubelet[2742]: I0712 00:25:19.344894 2742 state_mem.go:75] "Updated machine memory state" Jul 12 00:25:19.359000 audit[2485]: AVC avc: denied { watch } for pid=2485 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=7375 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c411 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Jul 12 00:25:19.359000 audit[2485]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000a6fac0 a2=fc6 a3=0 items=0 ppid=2324 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c411 key=(null) Jul 12 00:25:19.359000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 12 00:25:19.362475 kubelet[2742]: I0712 00:25:19.355175 2742 manager.go:513] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 12 00:25:19.363000 audit[2742]: AVC avc: denied { mac_admin } for pid=2742 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:19.363000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 12 00:25:19.363000 audit[2742]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40007317a0 a1=4000d1ac78 a2=4000731770 a3=25 items=0 ppid=1 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:19.363000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 12 00:25:19.364984 kubelet[2742]: I0712 00:25:19.363843 2742 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Jul 12 00:25:19.364984 kubelet[2742]: I0712 00:25:19.364250 2742 eviction_manager.go:189] "Eviction manager: starting control loop" Jul 12 00:25:19.364984 kubelet[2742]: I0712 00:25:19.364271 2742 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Jul 12 00:25:19.365165 kubelet[2742]: I0712 00:25:19.365096 2742 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 12 00:25:19.487814 kubelet[2742]: I0712 00:25:19.487743 2742 kubelet_node_status.go:72] "Attempting to register node" node="ip-172-31-26-167" Jul 12 00:25:19.517212 kubelet[2742]: I0712 00:25:19.517157 2742 kubelet_node_status.go:111] "Node was previously registered" node="ip-172-31-26-167" Jul 12 00:25:19.517580 kubelet[2742]: I0712 00:25:19.517555 2742 kubelet_node_status.go:75] "Successfully registered node" node="ip-172-31-26-167" Jul 12 00:25:19.520374 kubelet[2742]: I0712 00:25:19.520331 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a95be01496d123445976f5439afd7389-ca-certs\") pod \"kube-controller-manager-ip-172-31-26-167\" (UID: \"a95be01496d123445976f5439afd7389\") " pod="kube-system/kube-controller-manager-ip-172-31-26-167" Jul 12 00:25:19.520671 kubelet[2742]: I0712 00:25:19.520623 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/a95be01496d123445976f5439afd7389-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-26-167\" (UID: \"a95be01496d123445976f5439afd7389\") " pod="kube-system/kube-controller-manager-ip-172-31-26-167" Jul 12 00:25:19.520896 kubelet[2742]: I0712 00:25:19.520848 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a95be01496d123445976f5439afd7389-k8s-certs\") pod \"kube-controller-manager-ip-172-31-26-167\" (UID: \"a95be01496d123445976f5439afd7389\") " pod="kube-system/kube-controller-manager-ip-172-31-26-167" Jul 12 00:25:19.523019 kubelet[2742]: I0712 00:25:19.522967 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a95be01496d123445976f5439afd7389-kubeconfig\") pod \"kube-controller-manager-ip-172-31-26-167\" (UID: \"a95be01496d123445976f5439afd7389\") " pod="kube-system/kube-controller-manager-ip-172-31-26-167" Jul 12 00:25:19.523312 kubelet[2742]: I0712 00:25:19.523030 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a95be01496d123445976f5439afd7389-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-26-167\" (UID: \"a95be01496d123445976f5439afd7389\") " pod="kube-system/kube-controller-manager-ip-172-31-26-167" Jul 12 00:25:19.523312 kubelet[2742]: I0712 00:25:19.523077 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/9cd5f4597c5437df4b1e0f9ae619193d-kubeconfig\") pod \"kube-scheduler-ip-172-31-26-167\" (UID: \"9cd5f4597c5437df4b1e0f9ae619193d\") " pod="kube-system/kube-scheduler-ip-172-31-26-167" Jul 12 00:25:19.523312 kubelet[2742]: I0712 00:25:19.523115 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/44a73937b5c0cd5f47a9d0a4d9267fd5-ca-certs\") pod \"kube-apiserver-ip-172-31-26-167\" (UID: \"44a73937b5c0cd5f47a9d0a4d9267fd5\") " pod="kube-system/kube-apiserver-ip-172-31-26-167" Jul 12 00:25:19.523312 kubelet[2742]: I0712 00:25:19.523154 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/44a73937b5c0cd5f47a9d0a4d9267fd5-k8s-certs\") pod \"kube-apiserver-ip-172-31-26-167\" (UID: \"44a73937b5c0cd5f47a9d0a4d9267fd5\") " pod="kube-system/kube-apiserver-ip-172-31-26-167" Jul 12 00:25:19.523312 kubelet[2742]: I0712 00:25:19.523209 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/44a73937b5c0cd5f47a9d0a4d9267fd5-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-26-167\" (UID: \"44a73937b5c0cd5f47a9d0a4d9267fd5\") " pod="kube-system/kube-apiserver-ip-172-31-26-167" Jul 12 00:25:20.036401 kubelet[2742]: I0712 00:25:20.036330 2742 apiserver.go:52] "Watching apiserver" Jul 12 00:25:20.099001 kubelet[2742]: I0712 00:25:20.098918 2742 desired_state_of_world_populator.go:155] "Finished populating initial desired state of world" Jul 12 00:25:20.312053 kubelet[2742]: I0712 00:25:20.311847 2742 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ip-172-31-26-167" podStartSLOduration=1.311825499 podStartE2EDuration="1.311825499s" podCreationTimestamp="2025-07-12 00:25:19 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-07-12 00:25:20.293929269 +0000 UTC m=+1.437908547" watchObservedRunningTime="2025-07-12 00:25:20.311825499 +0000 UTC m=+1.455804741" Jul 12 00:25:20.330487 kubelet[2742]: I0712 00:25:20.330389 2742 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ip-172-31-26-167" podStartSLOduration=1.330366108 podStartE2EDuration="1.330366108s" podCreationTimestamp="2025-07-12 00:25:19 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-07-12 00:25:20.3139169 +0000 UTC m=+1.457896190" watchObservedRunningTime="2025-07-12 00:25:20.330366108 +0000 UTC m=+1.474345350" Jul 12 00:25:20.356028 kubelet[2742]: I0712 00:25:20.355929 2742 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ip-172-31-26-167" podStartSLOduration=1.355904754 podStartE2EDuration="1.355904754s" podCreationTimestamp="2025-07-12 00:25:19 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-07-12 00:25:20.331511111 +0000 UTC m=+1.475490365" watchObservedRunningTime="2025-07-12 00:25:20.355904754 +0000 UTC m=+1.499884008" Jul 12 00:25:23.787179 kubelet[2742]: I0712 00:25:23.787124 2742 kuberuntime_manager.go:1635] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Jul 12 00:25:23.787855 env[1733]: time="2025-07-12T00:25:23.787596770Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Jul 12 00:25:23.788342 kubelet[2742]: I0712 00:25:23.787924 2742 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Jul 12 00:25:24.550287 systemd[1]: Created slice kubepods-besteffort-pod6b765089_2cd8_4b5b_9d41_02f79abc007e.slice. Jul 12 00:25:24.657789 kubelet[2742]: I0712 00:25:24.657729 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2nq8r\" (UniqueName: \"kubernetes.io/projected/6b765089-2cd8-4b5b-9d41-02f79abc007e-kube-api-access-2nq8r\") pod \"kube-proxy-5h4q2\" (UID: \"6b765089-2cd8-4b5b-9d41-02f79abc007e\") " pod="kube-system/kube-proxy-5h4q2" Jul 12 00:25:24.658101 kubelet[2742]: I0712 00:25:24.658064 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/6b765089-2cd8-4b5b-9d41-02f79abc007e-kube-proxy\") pod \"kube-proxy-5h4q2\" (UID: \"6b765089-2cd8-4b5b-9d41-02f79abc007e\") " pod="kube-system/kube-proxy-5h4q2" Jul 12 00:25:24.658297 kubelet[2742]: I0712 00:25:24.658269 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/6b765089-2cd8-4b5b-9d41-02f79abc007e-xtables-lock\") pod \"kube-proxy-5h4q2\" (UID: \"6b765089-2cd8-4b5b-9d41-02f79abc007e\") " pod="kube-system/kube-proxy-5h4q2" Jul 12 00:25:24.658463 kubelet[2742]: I0712 00:25:24.658436 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/6b765089-2cd8-4b5b-9d41-02f79abc007e-lib-modules\") pod \"kube-proxy-5h4q2\" (UID: \"6b765089-2cd8-4b5b-9d41-02f79abc007e\") " pod="kube-system/kube-proxy-5h4q2" Jul 12 00:25:24.696750 amazon-ssm-agent[1714]: 2025-07-12 00:25:24 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Jul 12 00:25:24.772586 kubelet[2742]: I0712 00:25:24.772536 2742 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Jul 12 00:25:24.861438 env[1733]: time="2025-07-12T00:25:24.861256251Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-5h4q2,Uid:6b765089-2cd8-4b5b-9d41-02f79abc007e,Namespace:kube-system,Attempt:0,}" Jul 12 00:25:24.899306 kubelet[2742]: W0712 00:25:24.899227 2742 reflector.go:561] object-"tigera-operator"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ip-172-31-26-167" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ip-172-31-26-167' and this object Jul 12 00:25:24.900152 kubelet[2742]: E0712 00:25:24.900073 2742 reflector.go:158] "Unhandled Error" err="object-\"tigera-operator\"/\"kube-root-ca.crt\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"kube-root-ca.crt\" is forbidden: User \"system:node:ip-172-31-26-167\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"tigera-operator\": no relationship found between node 'ip-172-31-26-167' and this object" logger="UnhandledError" Jul 12 00:25:24.900587 kubelet[2742]: W0712 00:25:24.900546 2742 reflector.go:561] object-"tigera-operator"/"kubernetes-services-endpoint": failed to list *v1.ConfigMap: configmaps "kubernetes-services-endpoint" is forbidden: User "system:node:ip-172-31-26-167" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ip-172-31-26-167' and this object Jul 12 00:25:24.901120 kubelet[2742]: E0712 00:25:24.900832 2742 reflector.go:158] "Unhandled Error" err="object-\"tigera-operator\"/\"kubernetes-services-endpoint\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"kubernetes-services-endpoint\" is forbidden: User \"system:node:ip-172-31-26-167\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"tigera-operator\": no relationship found between node 'ip-172-31-26-167' and this object" logger="UnhandledError" Jul 12 00:25:24.908083 systemd[1]: Created slice kubepods-besteffort-podcd775079_a3f4_48bc_97b0_2e493125feb4.slice. Jul 12 00:25:24.930046 env[1733]: time="2025-07-12T00:25:24.929874342Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 12 00:25:24.930046 env[1733]: time="2025-07-12T00:25:24.929991122Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 12 00:25:24.930307 env[1733]: time="2025-07-12T00:25:24.930019363Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 12 00:25:24.930518 env[1733]: time="2025-07-12T00:25:24.930352494Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8477db17234224a526f0204c9d29128e4e0cea218cb83914e0476fd770641779 pid=2792 runtime=io.containerd.runc.v2 Jul 12 00:25:24.961344 kubelet[2742]: I0712 00:25:24.961272 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/cd775079-a3f4-48bc-97b0-2e493125feb4-var-lib-calico\") pod \"tigera-operator-5bf8dfcb4-t2sd6\" (UID: \"cd775079-a3f4-48bc-97b0-2e493125feb4\") " pod="tigera-operator/tigera-operator-5bf8dfcb4-t2sd6" Jul 12 00:25:24.961586 kubelet[2742]: I0712 00:25:24.961352 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-n5grr\" (UniqueName: \"kubernetes.io/projected/cd775079-a3f4-48bc-97b0-2e493125feb4-kube-api-access-n5grr\") pod \"tigera-operator-5bf8dfcb4-t2sd6\" (UID: \"cd775079-a3f4-48bc-97b0-2e493125feb4\") " pod="tigera-operator/tigera-operator-5bf8dfcb4-t2sd6" Jul 12 00:25:24.979942 systemd[1]: Started cri-containerd-8477db17234224a526f0204c9d29128e4e0cea218cb83914e0476fd770641779.scope. Jul 12 00:25:25.020734 kernel: kauditd_printk_skb: 265 callbacks suppressed Jul 12 00:25:25.020907 kernel: audit: type=1400 audit(1752279925.017:816): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.035199 kernel: audit: type=1400 audit(1752279925.017:817): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.045058 kernel: audit: type=1400 audit(1752279925.017:818): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.061259 kernel: audit: type=1400 audit(1752279925.017:819): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.061450 kernel: audit: type=1400 audit(1752279925.017:820): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.070986 kernel: audit: type=1400 audit(1752279925.017:821): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.071071 kernel: audit: type=1400 audit(1752279925.017:822): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.082805 kernel: audit: type=1400 audit(1752279925.017:823): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.094983 kernel: audit: type=1400 audit(1752279925.017:824): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.103317 kernel: audit: type=1400 audit(1752279925.019:825): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.019000 audit: BPF prog-id=106 op=LOAD Jul 12 00:25:25.026000 audit[2801]: AVC avc: denied { bpf } for pid=2801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.026000 audit[2801]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2792 pid=2801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.026000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834373764623137323334323234613532366630323034633964323931 Jul 12 00:25:25.026000 audit[2801]: AVC avc: denied { perfmon } for pid=2801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.026000 audit[2801]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2792 pid=2801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.026000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834373764623137323334323234613532366630323034633964323931 Jul 12 00:25:25.026000 audit[2801]: AVC avc: denied { bpf } for pid=2801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.026000 audit[2801]: AVC avc: denied { bpf } for pid=2801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.026000 audit[2801]: AVC avc: denied { bpf } for pid=2801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.026000 audit[2801]: AVC avc: denied { perfmon } for pid=2801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.026000 audit[2801]: AVC avc: denied { perfmon } for pid=2801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.026000 audit[2801]: AVC avc: denied { perfmon } for pid=2801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.026000 audit[2801]: AVC avc: denied { perfmon } for pid=2801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.026000 audit[2801]: AVC avc: denied { perfmon } for pid=2801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.026000 audit[2801]: AVC avc: denied { bpf } for pid=2801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.026000 audit[2801]: AVC avc: denied { bpf } for pid=2801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.026000 audit: BPF prog-id=107 op=LOAD Jul 12 00:25:25.026000 audit[2801]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2792 pid=2801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.026000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834373764623137323334323234613532366630323034633964323931 Jul 12 00:25:25.035000 audit[2801]: AVC avc: denied { bpf } for pid=2801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.035000 audit[2801]: AVC avc: denied { bpf } for pid=2801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.035000 audit[2801]: AVC avc: denied { perfmon } for pid=2801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.035000 audit[2801]: AVC avc: denied { perfmon } for pid=2801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.035000 audit[2801]: AVC avc: denied { perfmon } for pid=2801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.035000 audit[2801]: AVC avc: denied { perfmon } for pid=2801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.035000 audit[2801]: AVC avc: denied { perfmon } for pid=2801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.035000 audit[2801]: AVC avc: denied { bpf } for pid=2801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.035000 audit[2801]: AVC avc: denied { bpf } for pid=2801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.035000 audit: BPF prog-id=108 op=LOAD Jul 12 00:25:25.035000 audit[2801]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2792 pid=2801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834373764623137323334323234613532366630323034633964323931 Jul 12 00:25:25.035000 audit: BPF prog-id=108 op=UNLOAD Jul 12 00:25:25.035000 audit: BPF prog-id=107 op=UNLOAD Jul 12 00:25:25.035000 audit[2801]: AVC avc: denied { bpf } for pid=2801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.035000 audit[2801]: AVC avc: denied { bpf } for pid=2801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.035000 audit[2801]: AVC avc: denied { bpf } for pid=2801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.035000 audit[2801]: AVC avc: denied { perfmon } for pid=2801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.035000 audit[2801]: AVC avc: denied { perfmon } for pid=2801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.035000 audit[2801]: AVC avc: denied { perfmon } for pid=2801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.035000 audit[2801]: AVC avc: denied { perfmon } for pid=2801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.035000 audit[2801]: AVC avc: denied { perfmon } for pid=2801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.035000 audit[2801]: AVC avc: denied { bpf } for pid=2801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.035000 audit[2801]: AVC avc: denied { bpf } for pid=2801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.035000 audit: BPF prog-id=109 op=LOAD Jul 12 00:25:25.035000 audit[2801]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2792 pid=2801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834373764623137323334323234613532366630323034633964323931 Jul 12 00:25:25.125533 env[1733]: time="2025-07-12T00:25:25.121175466Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-5h4q2,Uid:6b765089-2cd8-4b5b-9d41-02f79abc007e,Namespace:kube-system,Attempt:0,} returns sandbox id \"8477db17234224a526f0204c9d29128e4e0cea218cb83914e0476fd770641779\"" Jul 12 00:25:25.133319 env[1733]: time="2025-07-12T00:25:25.133261625Z" level=info msg="CreateContainer within sandbox \"8477db17234224a526f0204c9d29128e4e0cea218cb83914e0476fd770641779\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Jul 12 00:25:25.174665 env[1733]: time="2025-07-12T00:25:25.174571509Z" level=info msg="CreateContainer within sandbox \"8477db17234224a526f0204c9d29128e4e0cea218cb83914e0476fd770641779\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"d2df5fbe0a81f4fb067f19d985cdecf780ee0521c0729b5650c9736601417517\"" Jul 12 00:25:25.179279 env[1733]: time="2025-07-12T00:25:25.178311444Z" level=info msg="StartContainer for \"d2df5fbe0a81f4fb067f19d985cdecf780ee0521c0729b5650c9736601417517\"" Jul 12 00:25:25.212423 systemd[1]: Started cri-containerd-d2df5fbe0a81f4fb067f19d985cdecf780ee0521c0729b5650c9736601417517.scope. Jul 12 00:25:25.275000 audit[2833]: AVC avc: denied { perfmon } for pid=2833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.275000 audit[2833]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=2792 pid=2833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.275000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432646635666265306138316634666230363766313964393835636465 Jul 12 00:25:25.275000 audit[2833]: AVC avc: denied { bpf } for pid=2833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.275000 audit[2833]: AVC avc: denied { bpf } for pid=2833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.275000 audit[2833]: AVC avc: denied { bpf } for pid=2833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.275000 audit[2833]: AVC avc: denied { perfmon } for pid=2833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.275000 audit[2833]: AVC avc: denied { perfmon } for pid=2833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.275000 audit[2833]: AVC avc: denied { perfmon } for pid=2833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.275000 audit[2833]: AVC avc: denied { perfmon } for pid=2833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.275000 audit[2833]: AVC avc: denied { perfmon } for pid=2833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.275000 audit[2833]: AVC avc: denied { bpf } for pid=2833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.275000 audit[2833]: AVC avc: denied { bpf } for pid=2833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.275000 audit: BPF prog-id=110 op=LOAD Jul 12 00:25:25.275000 audit[2833]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=2792 pid=2833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.275000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432646635666265306138316634666230363766313964393835636465 Jul 12 00:25:25.275000 audit[2833]: AVC avc: denied { bpf } for pid=2833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.275000 audit[2833]: AVC avc: denied { bpf } for pid=2833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.275000 audit[2833]: AVC avc: denied { perfmon } for pid=2833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.275000 audit[2833]: AVC avc: denied { perfmon } for pid=2833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.275000 audit[2833]: AVC avc: denied { perfmon } for pid=2833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.275000 audit[2833]: AVC avc: denied { perfmon } for pid=2833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.275000 audit[2833]: AVC avc: denied { perfmon } for pid=2833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.275000 audit[2833]: AVC avc: denied { bpf } for pid=2833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.275000 audit[2833]: AVC avc: denied { bpf } for pid=2833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.275000 audit: BPF prog-id=111 op=LOAD Jul 12 00:25:25.275000 audit[2833]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=2792 pid=2833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.275000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432646635666265306138316634666230363766313964393835636465 Jul 12 00:25:25.276000 audit: BPF prog-id=111 op=UNLOAD Jul 12 00:25:25.276000 audit: BPF prog-id=110 op=UNLOAD Jul 12 00:25:25.276000 audit[2833]: AVC avc: denied { bpf } for pid=2833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.276000 audit[2833]: AVC avc: denied { bpf } for pid=2833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.276000 audit[2833]: AVC avc: denied { bpf } for pid=2833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.276000 audit[2833]: AVC avc: denied { perfmon } for pid=2833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.276000 audit[2833]: AVC avc: denied { perfmon } for pid=2833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.276000 audit[2833]: AVC avc: denied { perfmon } for pid=2833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.276000 audit[2833]: AVC avc: denied { perfmon } for pid=2833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.276000 audit[2833]: AVC avc: denied { perfmon } for pid=2833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.276000 audit[2833]: AVC avc: denied { bpf } for pid=2833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.276000 audit[2833]: AVC avc: denied { bpf } for pid=2833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:25.276000 audit: BPF prog-id=112 op=LOAD Jul 12 00:25:25.276000 audit[2833]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=2792 pid=2833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432646635666265306138316634666230363766313964393835636465 Jul 12 00:25:25.312579 env[1733]: time="2025-07-12T00:25:25.312509204Z" level=info msg="StartContainer for \"d2df5fbe0a81f4fb067f19d985cdecf780ee0521c0729b5650c9736601417517\" returns successfully" Jul 12 00:25:25.591000 audit[2893]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2893 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:25:25.591000 audit[2893]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff1164be0 a2=0 a3=1 items=0 ppid=2843 pid=2893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.591000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 12 00:25:25.595000 audit[2894]: NETFILTER_CFG table=nat:39 family=10 entries=1 op=nft_register_chain pid=2894 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:25:25.595000 audit[2894]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffed46b20 a2=0 a3=1 items=0 ppid=2843 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.595000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 12 00:25:25.600000 audit[2895]: NETFILTER_CFG table=filter:40 family=10 entries=1 op=nft_register_chain pid=2895 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:25:25.600000 audit[2895]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff71a91f0 a2=0 a3=1 items=0 ppid=2843 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.600000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 12 00:25:25.604000 audit[2896]: NETFILTER_CFG table=mangle:41 family=2 entries=1 op=nft_register_chain pid=2896 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:25:25.604000 audit[2896]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd54db820 a2=0 a3=1 items=0 ppid=2843 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.604000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 12 00:25:25.607000 audit[2897]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=2897 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:25:25.607000 audit[2897]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcb80ce20 a2=0 a3=1 items=0 ppid=2843 pid=2897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.607000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 12 00:25:25.610000 audit[2898]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2898 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:25:25.610000 audit[2898]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc7906500 a2=0 a3=1 items=0 ppid=2843 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.610000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 12 00:25:25.696000 audit[2899]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2899 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:25:25.696000 audit[2899]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffff987e40 a2=0 a3=1 items=0 ppid=2843 pid=2899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.696000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 12 00:25:25.703000 audit[2901]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2901 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:25:25.703000 audit[2901]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffc0ce1350 a2=0 a3=1 items=0 ppid=2843 pid=2901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.703000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Jul 12 00:25:25.713000 audit[2904]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2904 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:25:25.713000 audit[2904]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffd2701a50 a2=0 a3=1 items=0 ppid=2843 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.713000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Jul 12 00:25:25.717000 audit[2905]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2905 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:25:25.717000 audit[2905]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd9a143e0 a2=0 a3=1 items=0 ppid=2843 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.717000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 12 00:25:25.724000 audit[2907]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2907 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:25:25.724000 audit[2907]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe3b0a830 a2=0 a3=1 items=0 ppid=2843 pid=2907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.724000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 12 00:25:25.727000 audit[2908]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2908 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:25:25.727000 audit[2908]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffff3e8690 a2=0 a3=1 items=0 ppid=2843 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.727000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 12 00:25:25.733000 audit[2910]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2910 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:25:25.733000 audit[2910]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffffde43c80 a2=0 a3=1 items=0 ppid=2843 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.733000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 12 00:25:25.742000 audit[2913]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2913 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:25:25.742000 audit[2913]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffcb6f6d60 a2=0 a3=1 items=0 ppid=2843 pid=2913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.742000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Jul 12 00:25:25.746000 audit[2914]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2914 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:25:25.746000 audit[2914]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe848b290 a2=0 a3=1 items=0 ppid=2843 pid=2914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.746000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 12 00:25:25.753000 audit[2916]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2916 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:25:25.753000 audit[2916]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc27ee270 a2=0 a3=1 items=0 ppid=2843 pid=2916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.753000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 12 00:25:25.756000 audit[2917]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2917 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:25:25.756000 audit[2917]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdd121eb0 a2=0 a3=1 items=0 ppid=2843 pid=2917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.756000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 12 00:25:25.762000 audit[2919]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2919 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:25:25.762000 audit[2919]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffdf62240 a2=0 a3=1 items=0 ppid=2843 pid=2919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.762000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 12 00:25:25.772000 audit[2922]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2922 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:25:25.772000 audit[2922]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe7307110 a2=0 a3=1 items=0 ppid=2843 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.772000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 12 00:25:25.786000 audit[2925]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2925 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:25:25.786000 audit[2925]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffde2909f0 a2=0 a3=1 items=0 ppid=2843 pid=2925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.786000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 12 00:25:25.790000 audit[2926]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2926 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:25:25.790000 audit[2926]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff6f76370 a2=0 a3=1 items=0 ppid=2843 pid=2926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.790000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 12 00:25:25.795000 audit[2928]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2928 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:25:25.795000 audit[2928]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffe2f71a00 a2=0 a3=1 items=0 ppid=2843 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.795000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 12 00:25:25.803000 audit[2931]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2931 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:25:25.803000 audit[2931]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe58ebd60 a2=0 a3=1 items=0 ppid=2843 pid=2931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.803000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 12 00:25:25.806000 audit[2932]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2932 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:25:25.806000 audit[2932]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff66e2a60 a2=0 a3=1 items=0 ppid=2843 pid=2932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.806000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 12 00:25:25.811000 audit[2934]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2934 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 12 00:25:25.811000 audit[2934]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffdae751e0 a2=0 a3=1 items=0 ppid=2843 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.811000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 12 00:25:25.854000 audit[2940]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2940 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:25:25.854000 audit[2940]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffc8358fd0 a2=0 a3=1 items=0 ppid=2843 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.854000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:25:25.875000 audit[2940]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2940 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:25:25.875000 audit[2940]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=ffffc8358fd0 a2=0 a3=1 items=0 ppid=2843 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.875000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:25:25.879000 audit[2945]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2945 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:25:25.879000 audit[2945]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffd3756550 a2=0 a3=1 items=0 ppid=2843 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.879000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 12 00:25:25.884000 audit[2947]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2947 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:25:25.884000 audit[2947]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe5d63860 a2=0 a3=1 items=0 ppid=2843 pid=2947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.884000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Jul 12 00:25:25.892000 audit[2950]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2950 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:25:25.892000 audit[2950]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe33c78e0 a2=0 a3=1 items=0 ppid=2843 pid=2950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.892000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Jul 12 00:25:25.896000 audit[2951]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2951 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:25:25.896000 audit[2951]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd1cebbb0 a2=0 a3=1 items=0 ppid=2843 pid=2951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.896000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 12 00:25:25.903000 audit[2953]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2953 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:25:25.903000 audit[2953]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffa193410 a2=0 a3=1 items=0 ppid=2843 pid=2953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.903000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 12 00:25:25.906000 audit[2954]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2954 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:25:25.906000 audit[2954]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd0879bb0 a2=0 a3=1 items=0 ppid=2843 pid=2954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.906000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 12 00:25:25.912000 audit[2956]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2956 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:25:25.912000 audit[2956]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffff5b09f0 a2=0 a3=1 items=0 ppid=2843 pid=2956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.912000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Jul 12 00:25:25.920000 audit[2959]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2959 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:25:25.920000 audit[2959]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffd7e5e080 a2=0 a3=1 items=0 ppid=2843 pid=2959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.920000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 12 00:25:25.924000 audit[2960]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2960 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:25:25.924000 audit[2960]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe5bca8e0 a2=0 a3=1 items=0 ppid=2843 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.924000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 12 00:25:25.929000 audit[2962]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2962 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:25:25.929000 audit[2962]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd7066ed0 a2=0 a3=1 items=0 ppid=2843 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.929000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 12 00:25:25.932000 audit[2963]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2963 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:25:25.932000 audit[2963]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe28c3fa0 a2=0 a3=1 items=0 ppid=2843 pid=2963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.932000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 12 00:25:25.937000 audit[2965]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2965 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:25:25.937000 audit[2965]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc8044820 a2=0 a3=1 items=0 ppid=2843 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.937000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 12 00:25:25.945000 audit[2968]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2968 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:25:25.945000 audit[2968]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd06bf280 a2=0 a3=1 items=0 ppid=2843 pid=2968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.945000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 12 00:25:25.953000 audit[2971]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2971 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:25:25.953000 audit[2971]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffda47eaf0 a2=0 a3=1 items=0 ppid=2843 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.953000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Jul 12 00:25:25.956000 audit[2972]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2972 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:25:25.956000 audit[2972]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffffa42a2f0 a2=0 a3=1 items=0 ppid=2843 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.956000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 12 00:25:25.960000 audit[2974]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2974 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:25:25.960000 audit[2974]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=fffffbb862a0 a2=0 a3=1 items=0 ppid=2843 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.960000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 12 00:25:25.967000 audit[2977]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2977 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:25:25.967000 audit[2977]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffdcb981d0 a2=0 a3=1 items=0 ppid=2843 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.967000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 12 00:25:25.973000 audit[2978]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2978 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:25:25.973000 audit[2978]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd7d311a0 a2=0 a3=1 items=0 ppid=2843 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.973000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 12 00:25:25.978000 audit[2981]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2981 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:25:25.978000 audit[2981]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffff2ef9dd0 a2=0 a3=1 items=0 ppid=2843 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.978000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 12 00:25:25.981000 audit[2982]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2982 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:25:25.981000 audit[2982]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcd5131b0 a2=0 a3=1 items=0 ppid=2843 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.981000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 12 00:25:25.987000 audit[2984]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2984 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:25:25.987000 audit[2984]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff7704ae0 a2=0 a3=1 items=0 ppid=2843 pid=2984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.987000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 12 00:25:25.994000 audit[2987]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2987 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 12 00:25:25.994000 audit[2987]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffdb6cb880 a2=0 a3=1 items=0 ppid=2843 pid=2987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:25.994000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 12 00:25:26.000000 audit[2989]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2989 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 12 00:25:26.000000 audit[2989]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2088 a0=3 a1=fffffe60d6b0 a2=0 a3=1 items=0 ppid=2843 pid=2989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:26.000000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:25:26.001000 audit[2989]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2989 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 12 00:25:26.001000 audit[2989]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=fffffe60d6b0 a2=0 a3=1 items=0 ppid=2843 pid=2989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:26.001000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:25:26.116432 env[1733]: time="2025-07-12T00:25:26.116218886Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-5bf8dfcb4-t2sd6,Uid:cd775079-a3f4-48bc-97b0-2e493125feb4,Namespace:tigera-operator,Attempt:0,}" Jul 12 00:25:26.155445 env[1733]: time="2025-07-12T00:25:26.154971948Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 12 00:25:26.155445 env[1733]: time="2025-07-12T00:25:26.155167123Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 12 00:25:26.155445 env[1733]: time="2025-07-12T00:25:26.155260210Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 12 00:25:26.156268 env[1733]: time="2025-07-12T00:25:26.155874073Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/20efdbf35623298cc6446b2baae511c774dcb207b4573915d0698b4d8f382c37 pid=2999 runtime=io.containerd.runc.v2 Jul 12 00:25:26.203997 systemd[1]: Started cri-containerd-20efdbf35623298cc6446b2baae511c774dcb207b4573915d0698b4d8f382c37.scope. Jul 12 00:25:26.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:26.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:26.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:26.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:26.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:26.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:26.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:26.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:26.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:26.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:26.248000 audit: BPF prog-id=113 op=LOAD Jul 12 00:25:26.249000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:26.249000 audit[3009]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=2999 pid=3009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:26.249000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230656664626633353632333239386363363434366232626161653531 Jul 12 00:25:26.250000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:26.250000 audit[3009]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=2999 pid=3009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:26.250000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230656664626633353632333239386363363434366232626161653531 Jul 12 00:25:26.251000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:26.251000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:26.251000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:26.251000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:26.251000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:26.251000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:26.251000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:26.251000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:26.251000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:26.251000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:26.251000 audit: BPF prog-id=114 op=LOAD Jul 12 00:25:26.251000 audit[3009]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=2999 pid=3009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:26.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230656664626633353632333239386363363434366232626161653531 Jul 12 00:25:26.254000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:26.254000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:26.254000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:26.254000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:26.254000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:26.254000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:26.254000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:26.254000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:26.254000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:26.254000 audit: BPF prog-id=115 op=LOAD Jul 12 00:25:26.254000 audit[3009]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=2999 pid=3009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:26.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230656664626633353632333239386363363434366232626161653531 Jul 12 00:25:26.254000 audit: BPF prog-id=115 op=UNLOAD Jul 12 00:25:26.254000 audit: BPF prog-id=114 op=UNLOAD Jul 12 00:25:26.254000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:26.254000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:26.254000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:26.254000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:26.254000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:26.254000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:26.254000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:26.254000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:26.254000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:26.254000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:26.254000 audit: BPF prog-id=116 op=LOAD Jul 12 00:25:26.254000 audit[3009]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=2999 pid=3009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:26.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230656664626633353632333239386363363434366232626161653531 Jul 12 00:25:26.315943 kubelet[2742]: I0712 00:25:26.315699 2742 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-5h4q2" podStartSLOduration=2.315535653 podStartE2EDuration="2.315535653s" podCreationTimestamp="2025-07-12 00:25:24 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-07-12 00:25:26.295263274 +0000 UTC m=+7.439242552" watchObservedRunningTime="2025-07-12 00:25:26.315535653 +0000 UTC m=+7.459514907" Jul 12 00:25:26.345025 env[1733]: time="2025-07-12T00:25:26.344965278Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-5bf8dfcb4-t2sd6,Uid:cd775079-a3f4-48bc-97b0-2e493125feb4,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"20efdbf35623298cc6446b2baae511c774dcb207b4573915d0698b4d8f382c37\"" Jul 12 00:25:26.349437 env[1733]: time="2025-07-12T00:25:26.349365751Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.3\"" Jul 12 00:25:27.888554 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount879809681.mount: Deactivated successfully. Jul 12 00:25:29.100051 env[1733]: time="2025-07-12T00:25:29.099967265Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.38.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:25:29.104485 env[1733]: time="2025-07-12T00:25:29.104416182Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7f8a5b1dba618e907d5f7804e42b3bd7cd5766bc3b0a66da25ff2c687e356bb0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:25:29.108291 env[1733]: time="2025-07-12T00:25:29.108179345Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.38.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:25:29.112656 env[1733]: time="2025-07-12T00:25:29.112604810Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:dbf1bad0def7b5955dc8e4aeee96e23ead0bc5822f6872518e685cd0ed484121,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:25:29.113357 env[1733]: time="2025-07-12T00:25:29.113307895Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.3\" returns image reference \"sha256:7f8a5b1dba618e907d5f7804e42b3bd7cd5766bc3b0a66da25ff2c687e356bb0\"" Jul 12 00:25:29.121263 env[1733]: time="2025-07-12T00:25:29.121205709Z" level=info msg="CreateContainer within sandbox \"20efdbf35623298cc6446b2baae511c774dcb207b4573915d0698b4d8f382c37\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Jul 12 00:25:29.146609 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3110598242.mount: Deactivated successfully. Jul 12 00:25:29.164263 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1365839616.mount: Deactivated successfully. Jul 12 00:25:29.169253 env[1733]: time="2025-07-12T00:25:29.169184088Z" level=info msg="CreateContainer within sandbox \"20efdbf35623298cc6446b2baae511c774dcb207b4573915d0698b4d8f382c37\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"909dbde8e0812e0f7e5737bb421c525c3b1081ed59a1760ea97c8595dd6ecb2a\"" Jul 12 00:25:29.170488 env[1733]: time="2025-07-12T00:25:29.170417841Z" level=info msg="StartContainer for \"909dbde8e0812e0f7e5737bb421c525c3b1081ed59a1760ea97c8595dd6ecb2a\"" Jul 12 00:25:29.212270 systemd[1]: Started cri-containerd-909dbde8e0812e0f7e5737bb421c525c3b1081ed59a1760ea97c8595dd6ecb2a.scope. Jul 12 00:25:29.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:29.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:29.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:29.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:29.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:29.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:29.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:29.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:29.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:29.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:29.257000 audit: BPF prog-id=117 op=LOAD Jul 12 00:25:29.259000 audit[3040]: AVC avc: denied { bpf } for pid=3040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:29.259000 audit[3040]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bfb38 a2=10 a3=0 items=0 ppid=2999 pid=3040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:29.259000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930396462646538653038313265306637653537333762623432316335 Jul 12 00:25:29.259000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:29.259000 audit[3040]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bf5a0 a2=3c a3=0 items=0 ppid=2999 pid=3040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:29.259000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930396462646538653038313265306637653537333762623432316335 Jul 12 00:25:29.259000 audit[3040]: AVC avc: denied { bpf } for pid=3040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:29.259000 audit[3040]: AVC avc: denied { bpf } for pid=3040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:29.259000 audit[3040]: AVC avc: denied { bpf } for pid=3040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:29.259000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:29.259000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:29.259000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:29.259000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:29.259000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:29.259000 audit[3040]: AVC avc: denied { bpf } for pid=3040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:29.259000 audit[3040]: AVC avc: denied { bpf } for pid=3040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:29.259000 audit: BPF prog-id=118 op=LOAD Jul 12 00:25:29.259000 audit[3040]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bf8e0 a2=78 a3=0 items=0 ppid=2999 pid=3040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:29.259000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930396462646538653038313265306637653537333762623432316335 Jul 12 00:25:29.259000 audit[3040]: AVC avc: denied { bpf } for pid=3040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:29.259000 audit[3040]: AVC avc: denied { bpf } for pid=3040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:29.259000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:29.259000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:29.259000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:29.259000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:29.259000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:29.259000 audit[3040]: AVC avc: denied { bpf } for pid=3040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:29.259000 audit[3040]: AVC avc: denied { bpf } for pid=3040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:29.259000 audit: BPF prog-id=119 op=LOAD Jul 12 00:25:29.259000 audit[3040]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bf670 a2=78 a3=0 items=0 ppid=2999 pid=3040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:29.259000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930396462646538653038313265306637653537333762623432316335 Jul 12 00:25:29.259000 audit: BPF prog-id=119 op=UNLOAD Jul 12 00:25:29.260000 audit: BPF prog-id=118 op=UNLOAD Jul 12 00:25:29.260000 audit[3040]: AVC avc: denied { bpf } for pid=3040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:29.260000 audit[3040]: AVC avc: denied { bpf } for pid=3040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:29.260000 audit[3040]: AVC avc: denied { bpf } for pid=3040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:29.260000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:29.260000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:29.260000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:29.260000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:29.260000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:29.260000 audit[3040]: AVC avc: denied { bpf } for pid=3040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:29.260000 audit[3040]: AVC avc: denied { bpf } for pid=3040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:29.260000 audit: BPF prog-id=120 op=LOAD Jul 12 00:25:29.260000 audit[3040]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bfb40 a2=78 a3=0 items=0 ppid=2999 pid=3040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:29.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930396462646538653038313265306637653537333762623432316335 Jul 12 00:25:29.315839 env[1733]: time="2025-07-12T00:25:29.315771522Z" level=info msg="StartContainer for \"909dbde8e0812e0f7e5737bb421c525c3b1081ed59a1760ea97c8595dd6ecb2a\" returns successfully" Jul 12 00:25:36.254998 sudo[2019]: pam_unix(sudo:session): session closed for user root Jul 12 00:25:36.266846 kernel: kauditd_printk_skb: 357 callbacks suppressed Jul 12 00:25:36.266998 kernel: audit: type=1106 audit(1752279936.254:927): pid=2019 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 12 00:25:36.254000 audit[2019]: USER_END pid=2019 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 12 00:25:36.266000 audit[2019]: CRED_DISP pid=2019 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 12 00:25:36.277562 kernel: audit: type=1104 audit(1752279936.266:928): pid=2019 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 12 00:25:36.290634 sshd[2016]: pam_unix(sshd:session): session closed for user core Jul 12 00:25:36.292000 audit[2016]: USER_END pid=2016 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:25:36.297355 systemd[1]: sshd@6-172.31.26.167:22-147.75.109.163:58478.service: Deactivated successfully. Jul 12 00:25:36.298549 systemd[1]: session-7.scope: Deactivated successfully. Jul 12 00:25:36.298833 systemd[1]: session-7.scope: Consumed 10.428s CPU time. Jul 12 00:25:36.300759 systemd-logind[1726]: Session 7 logged out. Waiting for processes to exit. Jul 12 00:25:36.305129 systemd-logind[1726]: Removed session 7. Jul 12 00:25:36.292000 audit[2016]: CRED_DISP pid=2016 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:25:36.324341 kernel: audit: type=1106 audit(1752279936.292:929): pid=2016 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:25:36.324518 kernel: audit: type=1104 audit(1752279936.292:930): pid=2016 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:25:36.294000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.26.167:22-147.75.109.163:58478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:25:36.336113 kernel: audit: type=1131 audit(1752279936.294:931): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.26.167:22-147.75.109.163:58478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:25:40.161000 audit[3119]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=3119 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:25:40.168733 kernel: audit: type=1325 audit(1752279940.161:932): table=filter:89 family=2 entries=15 op=nft_register_rule pid=3119 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:25:40.161000 audit[3119]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffd5910140 a2=0 a3=1 items=0 ppid=2843 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:40.161000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:25:40.192575 kernel: audit: type=1300 audit(1752279940.161:932): arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffd5910140 a2=0 a3=1 items=0 ppid=2843 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:40.192817 kernel: audit: type=1327 audit(1752279940.161:932): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:25:40.186000 audit[3119]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=3119 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:25:40.200085 kernel: audit: type=1325 audit(1752279940.186:933): table=nat:90 family=2 entries=12 op=nft_register_rule pid=3119 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:25:40.186000 audit[3119]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffd5910140 a2=0 a3=1 items=0 ppid=2843 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:40.213363 kernel: audit: type=1300 audit(1752279940.186:933): arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffd5910140 a2=0 a3=1 items=0 ppid=2843 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:40.186000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:25:40.221000 audit[3121]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=3121 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:25:40.221000 audit[3121]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffd3968a60 a2=0 a3=1 items=0 ppid=2843 pid=3121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:40.221000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:25:40.229000 audit[3121]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=3121 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:25:40.229000 audit[3121]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffd3968a60 a2=0 a3=1 items=0 ppid=2843 pid=3121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:40.229000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:25:48.353633 kubelet[2742]: I0712 00:25:48.353529 2742 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-5bf8dfcb4-t2sd6" podStartSLOduration=21.585120021 podStartE2EDuration="24.353506653s" podCreationTimestamp="2025-07-12 00:25:24 +0000 UTC" firstStartedPulling="2025-07-12 00:25:26.348033332 +0000 UTC m=+7.492012574" lastFinishedPulling="2025-07-12 00:25:29.116419964 +0000 UTC m=+10.260399206" observedRunningTime="2025-07-12 00:25:30.302416922 +0000 UTC m=+11.446396200" watchObservedRunningTime="2025-07-12 00:25:48.353506653 +0000 UTC m=+29.497485907" Jul 12 00:25:48.356000 audit[3124]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=3124 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:25:48.359841 kernel: kauditd_printk_skb: 7 callbacks suppressed Jul 12 00:25:48.360010 kernel: audit: type=1325 audit(1752279948.356:936): table=filter:93 family=2 entries=17 op=nft_register_rule pid=3124 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:25:48.375464 systemd[1]: Created slice kubepods-besteffort-podf3d013b9_3939_41a7_9362_517ca47adefa.slice. Jul 12 00:25:48.356000 audit[3124]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6736 a0=3 a1=ffffdf5027a0 a2=0 a3=1 items=0 ppid=2843 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:48.356000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:25:48.396336 kernel: audit: type=1300 audit(1752279948.356:936): arch=c00000b7 syscall=211 success=yes exit=6736 a0=3 a1=ffffdf5027a0 a2=0 a3=1 items=0 ppid=2843 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:48.396505 kernel: audit: type=1327 audit(1752279948.356:936): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:25:48.399736 kernel: audit: type=1325 audit(1752279948.398:937): table=nat:94 family=2 entries=12 op=nft_register_rule pid=3124 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:25:48.398000 audit[3124]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=3124 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:25:48.398000 audit[3124]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffdf5027a0 a2=0 a3=1 items=0 ppid=2843 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:48.418088 kernel: audit: type=1300 audit(1752279948.398:937): arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffdf5027a0 a2=0 a3=1 items=0 ppid=2843 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:48.398000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:25:48.434612 kernel: audit: type=1327 audit(1752279948.398:937): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:25:48.435705 kubelet[2742]: I0712 00:25:48.435627 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/f3d013b9-3939-41a7-9362-517ca47adefa-typha-certs\") pod \"calico-typha-7bbbb58c8c-q6g54\" (UID: \"f3d013b9-3939-41a7-9362-517ca47adefa\") " pod="calico-system/calico-typha-7bbbb58c8c-q6g54" Jul 12 00:25:48.436012 kubelet[2742]: I0712 00:25:48.435725 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-l9trr\" (UniqueName: \"kubernetes.io/projected/f3d013b9-3939-41a7-9362-517ca47adefa-kube-api-access-l9trr\") pod \"calico-typha-7bbbb58c8c-q6g54\" (UID: \"f3d013b9-3939-41a7-9362-517ca47adefa\") " pod="calico-system/calico-typha-7bbbb58c8c-q6g54" Jul 12 00:25:48.436012 kubelet[2742]: I0712 00:25:48.435774 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f3d013b9-3939-41a7-9362-517ca47adefa-tigera-ca-bundle\") pod \"calico-typha-7bbbb58c8c-q6g54\" (UID: \"f3d013b9-3939-41a7-9362-517ca47adefa\") " pod="calico-system/calico-typha-7bbbb58c8c-q6g54" Jul 12 00:25:48.490000 audit[3126]: NETFILTER_CFG table=filter:95 family=2 entries=19 op=nft_register_rule pid=3126 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:25:48.490000 audit[3126]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=7480 a0=3 a1=fffffd034080 a2=0 a3=1 items=0 ppid=2843 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:48.509581 kernel: audit: type=1325 audit(1752279948.490:938): table=filter:95 family=2 entries=19 op=nft_register_rule pid=3126 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:25:48.509765 kernel: audit: type=1300 audit(1752279948.490:938): arch=c00000b7 syscall=211 success=yes exit=7480 a0=3 a1=fffffd034080 a2=0 a3=1 items=0 ppid=2843 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:48.490000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:25:48.518469 kernel: audit: type=1327 audit(1752279948.490:938): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:25:48.519000 audit[3126]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=3126 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:25:48.519000 audit[3126]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=fffffd034080 a2=0 a3=1 items=0 ppid=2843 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:48.519000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:25:48.527751 kernel: audit: type=1325 audit(1752279948.519:939): table=nat:96 family=2 entries=12 op=nft_register_rule pid=3126 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:25:48.688069 env[1733]: time="2025-07-12T00:25:48.687452448Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7bbbb58c8c-q6g54,Uid:f3d013b9-3939-41a7-9362-517ca47adefa,Namespace:calico-system,Attempt:0,}" Jul 12 00:25:48.727880 env[1733]: time="2025-07-12T00:25:48.727185271Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 12 00:25:48.727880 env[1733]: time="2025-07-12T00:25:48.727267970Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 12 00:25:48.727880 env[1733]: time="2025-07-12T00:25:48.727306145Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 12 00:25:48.727880 env[1733]: time="2025-07-12T00:25:48.727556246Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9036f23f81d06d9ab7886edfcb957142cb16fd8cf5788b5c36010efe4bcccf64 pid=3136 runtime=io.containerd.runc.v2 Jul 12 00:25:48.815395 systemd[1]: Started cri-containerd-9036f23f81d06d9ab7886edfcb957142cb16fd8cf5788b5c36010efe4bcccf64.scope. Jul 12 00:25:48.904782 systemd[1]: Created slice kubepods-besteffort-pod5726c467_9461_4fb1_8cc4_0ec0a4d6c845.slice. Jul 12 00:25:48.940977 kubelet[2742]: I0712 00:25:48.940821 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/5726c467-9461-4fb1-8cc4-0ec0a4d6c845-tigera-ca-bundle\") pod \"calico-node-xsm2r\" (UID: \"5726c467-9461-4fb1-8cc4-0ec0a4d6c845\") " pod="calico-system/calico-node-xsm2r" Jul 12 00:25:48.940977 kubelet[2742]: I0712 00:25:48.940908 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/5726c467-9461-4fb1-8cc4-0ec0a4d6c845-var-lib-calico\") pod \"calico-node-xsm2r\" (UID: \"5726c467-9461-4fb1-8cc4-0ec0a4d6c845\") " pod="calico-system/calico-node-xsm2r" Jul 12 00:25:48.941183 kubelet[2742]: I0712 00:25:48.940989 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/5726c467-9461-4fb1-8cc4-0ec0a4d6c845-cni-log-dir\") pod \"calico-node-xsm2r\" (UID: \"5726c467-9461-4fb1-8cc4-0ec0a4d6c845\") " pod="calico-system/calico-node-xsm2r" Jul 12 00:25:48.941183 kubelet[2742]: I0712 00:25:48.941033 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/5726c467-9461-4fb1-8cc4-0ec0a4d6c845-lib-modules\") pod \"calico-node-xsm2r\" (UID: \"5726c467-9461-4fb1-8cc4-0ec0a4d6c845\") " pod="calico-system/calico-node-xsm2r" Jul 12 00:25:48.941183 kubelet[2742]: I0712 00:25:48.941098 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/5726c467-9461-4fb1-8cc4-0ec0a4d6c845-xtables-lock\") pod \"calico-node-xsm2r\" (UID: \"5726c467-9461-4fb1-8cc4-0ec0a4d6c845\") " pod="calico-system/calico-node-xsm2r" Jul 12 00:25:48.941183 kubelet[2742]: I0712 00:25:48.941165 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/5726c467-9461-4fb1-8cc4-0ec0a4d6c845-flexvol-driver-host\") pod \"calico-node-xsm2r\" (UID: \"5726c467-9461-4fb1-8cc4-0ec0a4d6c845\") " pod="calico-system/calico-node-xsm2r" Jul 12 00:25:48.941438 kubelet[2742]: I0712 00:25:48.941209 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/5726c467-9461-4fb1-8cc4-0ec0a4d6c845-node-certs\") pod \"calico-node-xsm2r\" (UID: \"5726c467-9461-4fb1-8cc4-0ec0a4d6c845\") " pod="calico-system/calico-node-xsm2r" Jul 12 00:25:48.941438 kubelet[2742]: I0712 00:25:48.941271 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/5726c467-9461-4fb1-8cc4-0ec0a4d6c845-policysync\") pod \"calico-node-xsm2r\" (UID: \"5726c467-9461-4fb1-8cc4-0ec0a4d6c845\") " pod="calico-system/calico-node-xsm2r" Jul 12 00:25:48.941438 kubelet[2742]: I0712 00:25:48.941336 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/5726c467-9461-4fb1-8cc4-0ec0a4d6c845-cni-net-dir\") pod \"calico-node-xsm2r\" (UID: \"5726c467-9461-4fb1-8cc4-0ec0a4d6c845\") " pod="calico-system/calico-node-xsm2r" Jul 12 00:25:48.941438 kubelet[2742]: I0712 00:25:48.941385 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/5726c467-9461-4fb1-8cc4-0ec0a4d6c845-var-run-calico\") pod \"calico-node-xsm2r\" (UID: \"5726c467-9461-4fb1-8cc4-0ec0a4d6c845\") " pod="calico-system/calico-node-xsm2r" Jul 12 00:25:48.941664 kubelet[2742]: I0712 00:25:48.941464 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/5726c467-9461-4fb1-8cc4-0ec0a4d6c845-cni-bin-dir\") pod \"calico-node-xsm2r\" (UID: \"5726c467-9461-4fb1-8cc4-0ec0a4d6c845\") " pod="calico-system/calico-node-xsm2r" Jul 12 00:25:48.941664 kubelet[2742]: I0712 00:25:48.941526 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xf9th\" (UniqueName: \"kubernetes.io/projected/5726c467-9461-4fb1-8cc4-0ec0a4d6c845-kube-api-access-xf9th\") pod \"calico-node-xsm2r\" (UID: \"5726c467-9461-4fb1-8cc4-0ec0a4d6c845\") " pod="calico-system/calico-node-xsm2r" Jul 12 00:25:48.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:48.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:48.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:48.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:48.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:48.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:48.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:48.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:48.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:48.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:48.994000 audit: BPF prog-id=121 op=LOAD Jul 12 00:25:48.996000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:48.996000 audit[3147]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=3136 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:48.996000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930333666323366383164303664396162373838366564666362393537 Jul 12 00:25:48.996000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:48.996000 audit[3147]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3136 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:48.996000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930333666323366383164303664396162373838366564666362393537 Jul 12 00:25:48.996000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:48.996000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:48.996000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:48.996000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:48.996000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:48.996000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:48.996000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:48.996000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:48.996000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:48.996000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:48.996000 audit: BPF prog-id=122 op=LOAD Jul 12 00:25:48.996000 audit[3147]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=3136 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:48.996000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930333666323366383164303664396162373838366564666362393537 Jul 12 00:25:48.997000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:48.997000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:48.997000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:48.997000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:48.997000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:48.997000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:48.997000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:48.997000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:48.997000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:48.997000 audit: BPF prog-id=123 op=LOAD Jul 12 00:25:48.997000 audit[3147]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=3136 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:48.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930333666323366383164303664396162373838366564666362393537 Jul 12 00:25:48.997000 audit: BPF prog-id=123 op=UNLOAD Jul 12 00:25:48.997000 audit: BPF prog-id=122 op=UNLOAD Jul 12 00:25:48.997000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:48.997000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:48.997000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:48.997000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:48.997000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:48.997000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:48.997000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:48.997000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:48.997000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:48.997000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:48.997000 audit: BPF prog-id=124 op=LOAD Jul 12 00:25:48.997000 audit[3147]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=3136 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:48.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930333666323366383164303664396162373838366564666362393537 Jul 12 00:25:49.069174 kubelet[2742]: E0712 00:25:49.069115 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.069174 kubelet[2742]: W0712 00:25:49.069164 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.069417 kubelet[2742]: E0712 00:25:49.069204 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.099086 env[1733]: time="2025-07-12T00:25:49.099017911Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7bbbb58c8c-q6g54,Uid:f3d013b9-3939-41a7-9362-517ca47adefa,Namespace:calico-system,Attempt:0,} returns sandbox id \"9036f23f81d06d9ab7886edfcb957142cb16fd8cf5788b5c36010efe4bcccf64\"" Jul 12 00:25:49.102799 env[1733]: time="2025-07-12T00:25:49.102738590Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.2\"" Jul 12 00:25:49.138719 kubelet[2742]: E0712 00:25:49.138626 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.138719 kubelet[2742]: W0712 00:25:49.138671 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.138995 kubelet[2742]: E0712 00:25:49.138736 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.210742 env[1733]: time="2025-07-12T00:25:49.210556876Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-xsm2r,Uid:5726c467-9461-4fb1-8cc4-0ec0a4d6c845,Namespace:calico-system,Attempt:0,}" Jul 12 00:25:49.223177 kubelet[2742]: E0712 00:25:49.223119 2742 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-grn85" podUID="be5845dd-212b-4b4e-b99b-9489c28f56b4" Jul 12 00:25:49.224189 kubelet[2742]: E0712 00:25:49.224126 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.224189 kubelet[2742]: W0712 00:25:49.224169 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.224430 kubelet[2742]: E0712 00:25:49.224202 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.224964 kubelet[2742]: E0712 00:25:49.224909 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.224964 kubelet[2742]: W0712 00:25:49.224948 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.225177 kubelet[2742]: E0712 00:25:49.224982 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.225541 kubelet[2742]: E0712 00:25:49.225498 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.225541 kubelet[2742]: W0712 00:25:49.225533 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.225728 kubelet[2742]: E0712 00:25:49.225561 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.226097 kubelet[2742]: E0712 00:25:49.226057 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.226097 kubelet[2742]: W0712 00:25:49.226090 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.226293 kubelet[2742]: E0712 00:25:49.226119 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.228895 kubelet[2742]: E0712 00:25:49.228835 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.228895 kubelet[2742]: W0712 00:25:49.228878 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.229128 kubelet[2742]: E0712 00:25:49.228912 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.229491 kubelet[2742]: E0712 00:25:49.229446 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.229491 kubelet[2742]: W0712 00:25:49.229479 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.229654 kubelet[2742]: E0712 00:25:49.229506 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.229911 kubelet[2742]: E0712 00:25:49.229867 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.229911 kubelet[2742]: W0712 00:25:49.229899 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.230053 kubelet[2742]: E0712 00:25:49.229924 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.231081 kubelet[2742]: E0712 00:25:49.231023 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.231081 kubelet[2742]: W0712 00:25:49.231062 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.231309 kubelet[2742]: E0712 00:25:49.231094 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.231514 kubelet[2742]: E0712 00:25:49.231472 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.231514 kubelet[2742]: W0712 00:25:49.231503 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.231823 kubelet[2742]: E0712 00:25:49.231526 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.231896 kubelet[2742]: E0712 00:25:49.231865 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.231896 kubelet[2742]: W0712 00:25:49.231883 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.232020 kubelet[2742]: E0712 00:25:49.231904 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.232376 kubelet[2742]: E0712 00:25:49.232336 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.232376 kubelet[2742]: W0712 00:25:49.232367 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.232531 kubelet[2742]: E0712 00:25:49.232391 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.233124 kubelet[2742]: E0712 00:25:49.232746 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.233124 kubelet[2742]: W0712 00:25:49.232765 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.233124 kubelet[2742]: E0712 00:25:49.232786 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.233744 kubelet[2742]: E0712 00:25:49.233660 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.233744 kubelet[2742]: W0712 00:25:49.233715 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.233878 kubelet[2742]: E0712 00:25:49.233748 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.234409 kubelet[2742]: E0712 00:25:49.234165 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.234409 kubelet[2742]: W0712 00:25:49.234202 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.234409 kubelet[2742]: E0712 00:25:49.234230 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.238128 kubelet[2742]: E0712 00:25:49.238031 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.238128 kubelet[2742]: W0712 00:25:49.238072 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.238128 kubelet[2742]: E0712 00:25:49.238106 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.238586 kubelet[2742]: E0712 00:25:49.238549 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.238586 kubelet[2742]: W0712 00:25:49.238579 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.238784 kubelet[2742]: E0712 00:25:49.238605 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.239172 kubelet[2742]: E0712 00:25:49.239119 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.239172 kubelet[2742]: W0712 00:25:49.239156 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.239341 kubelet[2742]: E0712 00:25:49.239185 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.239552 kubelet[2742]: E0712 00:25:49.239516 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.239552 kubelet[2742]: W0712 00:25:49.239546 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.239749 kubelet[2742]: E0712 00:25:49.239571 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.239960 kubelet[2742]: E0712 00:25:49.239923 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.239960 kubelet[2742]: W0712 00:25:49.239954 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.240111 kubelet[2742]: E0712 00:25:49.239979 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.240325 kubelet[2742]: E0712 00:25:49.240288 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.240325 kubelet[2742]: W0712 00:25:49.240318 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.240476 kubelet[2742]: E0712 00:25:49.240340 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.248203 kubelet[2742]: E0712 00:25:49.248151 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.248203 kubelet[2742]: W0712 00:25:49.248191 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.248440 kubelet[2742]: E0712 00:25:49.248226 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.248440 kubelet[2742]: I0712 00:25:49.248285 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/be5845dd-212b-4b4e-b99b-9489c28f56b4-kubelet-dir\") pod \"csi-node-driver-grn85\" (UID: \"be5845dd-212b-4b4e-b99b-9489c28f56b4\") " pod="calico-system/csi-node-driver-grn85" Jul 12 00:25:49.255906 kubelet[2742]: E0712 00:25:49.255842 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.255906 kubelet[2742]: W0712 00:25:49.255889 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.256183 kubelet[2742]: E0712 00:25:49.255937 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.256183 kubelet[2742]: I0712 00:25:49.255989 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/be5845dd-212b-4b4e-b99b-9489c28f56b4-registration-dir\") pod \"csi-node-driver-grn85\" (UID: \"be5845dd-212b-4b4e-b99b-9489c28f56b4\") " pod="calico-system/csi-node-driver-grn85" Jul 12 00:25:49.256555 kubelet[2742]: E0712 00:25:49.256511 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.256555 kubelet[2742]: W0712 00:25:49.256547 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.256820 kubelet[2742]: E0712 00:25:49.256776 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.256926 kubelet[2742]: I0712 00:25:49.256833 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/be5845dd-212b-4b4e-b99b-9489c28f56b4-socket-dir\") pod \"csi-node-driver-grn85\" (UID: \"be5845dd-212b-4b4e-b99b-9489c28f56b4\") " pod="calico-system/csi-node-driver-grn85" Jul 12 00:25:49.257127 kubelet[2742]: E0712 00:25:49.257088 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.257127 kubelet[2742]: W0712 00:25:49.257117 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.258315 kubelet[2742]: E0712 00:25:49.257320 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.258315 kubelet[2742]: E0712 00:25:49.257457 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.258315 kubelet[2742]: W0712 00:25:49.257474 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.258315 kubelet[2742]: E0712 00:25:49.257495 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.258315 kubelet[2742]: E0712 00:25:49.257831 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.258315 kubelet[2742]: W0712 00:25:49.257849 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.258315 kubelet[2742]: E0712 00:25:49.257872 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.258315 kubelet[2742]: I0712 00:25:49.257910 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/be5845dd-212b-4b4e-b99b-9489c28f56b4-varrun\") pod \"csi-node-driver-grn85\" (UID: \"be5845dd-212b-4b4e-b99b-9489c28f56b4\") " pod="calico-system/csi-node-driver-grn85" Jul 12 00:25:49.258315 kubelet[2742]: E0712 00:25:49.258195 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.258991 kubelet[2742]: W0712 00:25:49.258212 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.258991 kubelet[2742]: E0712 00:25:49.258234 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.261738 kubelet[2742]: E0712 00:25:49.261642 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.261738 kubelet[2742]: W0712 00:25:49.261712 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.262055 kubelet[2742]: E0712 00:25:49.261748 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.262368 kubelet[2742]: E0712 00:25:49.262331 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.262368 kubelet[2742]: W0712 00:25:49.262363 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.262506 kubelet[2742]: E0712 00:25:49.262397 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.262868 kubelet[2742]: E0712 00:25:49.262831 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.262868 kubelet[2742]: W0712 00:25:49.262860 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.263032 kubelet[2742]: E0712 00:25:49.262893 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.263032 kubelet[2742]: I0712 00:25:49.262955 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6942t\" (UniqueName: \"kubernetes.io/projected/be5845dd-212b-4b4e-b99b-9489c28f56b4-kube-api-access-6942t\") pod \"csi-node-driver-grn85\" (UID: \"be5845dd-212b-4b4e-b99b-9489c28f56b4\") " pod="calico-system/csi-node-driver-grn85" Jul 12 00:25:49.263405 kubelet[2742]: E0712 00:25:49.263363 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.263507 kubelet[2742]: W0712 00:25:49.263404 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.263507 kubelet[2742]: E0712 00:25:49.263434 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.263951 kubelet[2742]: E0712 00:25:49.263912 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.263951 kubelet[2742]: W0712 00:25:49.263944 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.264141 kubelet[2742]: E0712 00:25:49.263970 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.267802 kubelet[2742]: E0712 00:25:49.267310 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.267802 kubelet[2742]: W0712 00:25:49.267353 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.267802 kubelet[2742]: E0712 00:25:49.267388 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.268116 kubelet[2742]: E0712 00:25:49.267975 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.268116 kubelet[2742]: W0712 00:25:49.268000 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.268116 kubelet[2742]: E0712 00:25:49.268029 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.268416 kubelet[2742]: E0712 00:25:49.268387 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.268416 kubelet[2742]: W0712 00:25:49.268408 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.268535 kubelet[2742]: E0712 00:25:49.268430 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.278090 env[1733]: time="2025-07-12T00:25:49.277957227Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 12 00:25:49.278434 env[1733]: time="2025-07-12T00:25:49.278342591Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 12 00:25:49.278723 env[1733]: time="2025-07-12T00:25:49.278615049Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 12 00:25:49.279399 env[1733]: time="2025-07-12T00:25:49.279241669Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6577220d5a9b3b976a93bcd3b34d0d37f8ac1e746640e9c4fe5b81a82d33d0dd pid=3213 runtime=io.containerd.runc.v2 Jul 12 00:25:49.313799 systemd[1]: Started cri-containerd-6577220d5a9b3b976a93bcd3b34d0d37f8ac1e746640e9c4fe5b81a82d33d0dd.scope. Jul 12 00:25:49.369297 kubelet[2742]: E0712 00:25:49.369242 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.369297 kubelet[2742]: W0712 00:25:49.369284 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.370180 kubelet[2742]: E0712 00:25:49.369317 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.370180 kubelet[2742]: E0712 00:25:49.369810 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.370180 kubelet[2742]: W0712 00:25:49.369834 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.370180 kubelet[2742]: E0712 00:25:49.369886 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.370837 kubelet[2742]: E0712 00:25:49.370793 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.370837 kubelet[2742]: W0712 00:25:49.370831 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.371087 kubelet[2742]: E0712 00:25:49.370873 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.371333 kubelet[2742]: E0712 00:25:49.371286 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.371333 kubelet[2742]: W0712 00:25:49.371320 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.371500 kubelet[2742]: E0712 00:25:49.371481 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.372275 kubelet[2742]: E0712 00:25:49.372231 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.372275 kubelet[2742]: W0712 00:25:49.372266 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.372490 kubelet[2742]: E0712 00:25:49.372463 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.372886 kubelet[2742]: E0712 00:25:49.372804 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.372886 kubelet[2742]: W0712 00:25:49.372834 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.373078 kubelet[2742]: E0712 00:25:49.373002 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.374118 kubelet[2742]: E0712 00:25:49.374066 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.374118 kubelet[2742]: W0712 00:25:49.374104 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.374357 kubelet[2742]: E0712 00:25:49.374282 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.375890 kubelet[2742]: E0712 00:25:49.375842 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.375890 kubelet[2742]: W0712 00:25:49.375878 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.376568 kubelet[2742]: E0712 00:25:49.376213 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.378887 kubelet[2742]: E0712 00:25:49.378821 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.379100 kubelet[2742]: W0712 00:25:49.378931 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.379482 kubelet[2742]: E0712 00:25:49.379186 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.379964 kubelet[2742]: E0712 00:25:49.379923 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.379964 kubelet[2742]: W0712 00:25:49.379955 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.380617 kubelet[2742]: E0712 00:25:49.380186 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.382378 kubelet[2742]: E0712 00:25:49.382115 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.382378 kubelet[2742]: W0712 00:25:49.382153 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.382378 kubelet[2742]: E0712 00:25:49.382320 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.382778 kubelet[2742]: E0712 00:25:49.382562 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.382778 kubelet[2742]: W0712 00:25:49.382580 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.382778 kubelet[2742]: E0712 00:25:49.382771 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.383506 kubelet[2742]: E0712 00:25:49.383463 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.383506 kubelet[2742]: W0712 00:25:49.383500 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.383772 kubelet[2742]: E0712 00:25:49.383738 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.385379 kubelet[2742]: E0712 00:25:49.384750 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.385379 kubelet[2742]: W0712 00:25:49.384788 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.385379 kubelet[2742]: E0712 00:25:49.384870 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.386605 kubelet[2742]: E0712 00:25:49.386439 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.386605 kubelet[2742]: W0712 00:25:49.386478 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.386605 kubelet[2742]: E0712 00:25:49.386527 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.387143 kubelet[2742]: E0712 00:25:49.387009 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.387143 kubelet[2742]: W0712 00:25:49.387042 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.387143 kubelet[2742]: E0712 00:25:49.387097 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.391464 kubelet[2742]: E0712 00:25:49.391259 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.391464 kubelet[2742]: W0712 00:25:49.391299 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.391742 kubelet[2742]: E0712 00:25:49.391497 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.391813 kubelet[2742]: E0712 00:25:49.391768 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.391813 kubelet[2742]: W0712 00:25:49.391786 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.392104 kubelet[2742]: E0712 00:25:49.391984 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.394959 kubelet[2742]: E0712 00:25:49.394878 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.394959 kubelet[2742]: W0712 00:25:49.394934 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.395210 kubelet[2742]: E0712 00:25:49.395133 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.395437 kubelet[2742]: E0712 00:25:49.395399 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.395574 kubelet[2742]: W0712 00:25:49.395436 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.395652 kubelet[2742]: E0712 00:25:49.395620 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.396805 kubelet[2742]: E0712 00:25:49.396724 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.396805 kubelet[2742]: W0712 00:25:49.396766 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.397048 kubelet[2742]: E0712 00:25:49.397006 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.397323 kubelet[2742]: E0712 00:25:49.397285 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.397323 kubelet[2742]: W0712 00:25:49.397316 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.397650 kubelet[2742]: E0712 00:25:49.397492 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.399869 kubelet[2742]: E0712 00:25:49.399812 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.399869 kubelet[2742]: W0712 00:25:49.399858 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.400402 kubelet[2742]: E0712 00:25:49.400185 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.402460 kubelet[2742]: E0712 00:25:49.402409 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.402460 kubelet[2742]: W0712 00:25:49.402451 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.402730 kubelet[2742]: E0712 00:25:49.402496 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.403109 kubelet[2742]: E0712 00:25:49.403062 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.403109 kubelet[2742]: W0712 00:25:49.403100 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.403362 kubelet[2742]: E0712 00:25:49.403131 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.454753 kubelet[2742]: E0712 00:25:49.454663 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:49.454992 kubelet[2742]: W0712 00:25:49.454958 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:49.455152 kubelet[2742]: E0712 00:25:49.455123 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:49.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:49.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:49.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:49.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:49.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:49.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:49.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:49.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:49.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:49.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:49.467000 audit: BPF prog-id=125 op=LOAD Jul 12 00:25:49.469000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:49.469000 audit[3226]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=3213 pid=3226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:49.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635373732323064356139623362393736613933626364336233346430 Jul 12 00:25:49.469000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:49.469000 audit[3226]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=3213 pid=3226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:49.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635373732323064356139623362393736613933626364336233346430 Jul 12 00:25:49.469000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:49.469000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:49.469000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:49.469000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:49.469000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:49.469000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:49.469000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:49.469000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:49.469000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:49.469000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:49.469000 audit: BPF prog-id=126 op=LOAD Jul 12 00:25:49.469000 audit[3226]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=3213 pid=3226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:49.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635373732323064356139623362393736613933626364336233346430 Jul 12 00:25:49.469000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:49.469000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:49.469000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:49.469000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:49.469000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:49.469000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:49.469000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:49.469000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:49.469000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:49.469000 audit: BPF prog-id=127 op=LOAD Jul 12 00:25:49.469000 audit[3226]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=3213 pid=3226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:49.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635373732323064356139623362393736613933626364336233346430 Jul 12 00:25:49.469000 audit: BPF prog-id=127 op=UNLOAD Jul 12 00:25:49.469000 audit: BPF prog-id=126 op=UNLOAD Jul 12 00:25:49.469000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:49.469000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:49.469000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:49.469000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:49.469000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:49.469000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:49.469000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:49.469000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:49.469000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:49.469000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:49.469000 audit: BPF prog-id=128 op=LOAD Jul 12 00:25:49.469000 audit[3226]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=3213 pid=3226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:49.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635373732323064356139623362393736613933626364336233346430 Jul 12 00:25:49.601310 env[1733]: time="2025-07-12T00:25:49.601238298Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-xsm2r,Uid:5726c467-9461-4fb1-8cc4-0ec0a4d6c845,Namespace:calico-system,Attempt:0,} returns sandbox id \"6577220d5a9b3b976a93bcd3b34d0d37f8ac1e746640e9c4fe5b81a82d33d0dd\"" Jul 12 00:25:49.631000 audit[3278]: NETFILTER_CFG table=filter:97 family=2 entries=21 op=nft_register_rule pid=3278 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:25:49.631000 audit[3278]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8224 a0=3 a1=ffffdf8aac00 a2=0 a3=1 items=0 ppid=2843 pid=3278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:49.631000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:25:49.640000 audit[3278]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=3278 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:25:49.640000 audit[3278]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffdf8aac00 a2=0 a3=1 items=0 ppid=2843 pid=3278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:49.640000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:25:50.373412 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1822848479.mount: Deactivated successfully. Jul 12 00:25:51.176901 kubelet[2742]: E0712 00:25:51.176636 2742 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-grn85" podUID="be5845dd-212b-4b4e-b99b-9489c28f56b4" Jul 12 00:25:52.034573 env[1733]: time="2025-07-12T00:25:52.034502658Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:25:52.039916 env[1733]: time="2025-07-12T00:25:52.039841913Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bd819526ff844d29b60cd75e846a1f55306016ff269d881d52a9b6c7b2eef0b2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:25:52.044255 env[1733]: time="2025-07-12T00:25:52.044195699Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:25:52.048088 env[1733]: time="2025-07-12T00:25:52.048010055Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:da29d745efe5eb7d25f765d3aa439f3fe60710a458efe39c285e58b02bd961af,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:25:52.048613 env[1733]: time="2025-07-12T00:25:52.048555126Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.2\" returns image reference \"sha256:bd819526ff844d29b60cd75e846a1f55306016ff269d881d52a9b6c7b2eef0b2\"" Jul 12 00:25:52.052531 env[1733]: time="2025-07-12T00:25:52.052463605Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2\"" Jul 12 00:25:52.095056 env[1733]: time="2025-07-12T00:25:52.094987769Z" level=info msg="CreateContainer within sandbox \"9036f23f81d06d9ab7886edfcb957142cb16fd8cf5788b5c36010efe4bcccf64\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Jul 12 00:25:52.138389 env[1733]: time="2025-07-12T00:25:52.138295643Z" level=info msg="CreateContainer within sandbox \"9036f23f81d06d9ab7886edfcb957142cb16fd8cf5788b5c36010efe4bcccf64\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"e2ad592d3e19de6ad15d6b5b1fd7d3dab86eff027b2951fad28ebdbc1bf2476d\"" Jul 12 00:25:52.142570 env[1733]: time="2025-07-12T00:25:52.142485724Z" level=info msg="StartContainer for \"e2ad592d3e19de6ad15d6b5b1fd7d3dab86eff027b2951fad28ebdbc1bf2476d\"" Jul 12 00:25:52.184079 systemd[1]: Started cri-containerd-e2ad592d3e19de6ad15d6b5b1fd7d3dab86eff027b2951fad28ebdbc1bf2476d.scope. Jul 12 00:25:52.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:52.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:52.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:52.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:52.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:52.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:52.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:52.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:52.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:52.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:52.248000 audit: BPF prog-id=129 op=LOAD Jul 12 00:25:52.249000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:52.249000 audit[3289]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3136 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:52.249000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532616435393264336531396465366164313564366235623166643764 Jul 12 00:25:52.249000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:52.249000 audit[3289]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3136 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:52.249000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532616435393264336531396465366164313564366235623166643764 Jul 12 00:25:52.249000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:52.249000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:52.249000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:52.249000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:52.249000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:52.249000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:52.249000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:52.249000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:52.249000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:52.249000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:52.249000 audit: BPF prog-id=130 op=LOAD Jul 12 00:25:52.249000 audit[3289]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3136 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:52.249000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532616435393264336531396465366164313564366235623166643764 Jul 12 00:25:52.249000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:52.249000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:52.249000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:52.249000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:52.249000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:52.249000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:52.249000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:52.249000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:52.249000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:52.249000 audit: BPF prog-id=131 op=LOAD Jul 12 00:25:52.249000 audit[3289]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3136 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:52.249000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532616435393264336531396465366164313564366235623166643764 Jul 12 00:25:52.250000 audit: BPF prog-id=131 op=UNLOAD Jul 12 00:25:52.250000 audit: BPF prog-id=130 op=UNLOAD Jul 12 00:25:52.250000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:52.250000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:52.250000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:52.250000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:52.250000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:52.250000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:52.250000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:52.250000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:52.250000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:52.250000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:52.250000 audit: BPF prog-id=132 op=LOAD Jul 12 00:25:52.250000 audit[3289]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3136 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:52.250000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532616435393264336531396465366164313564366235623166643764 Jul 12 00:25:52.302197 env[1733]: time="2025-07-12T00:25:52.302042927Z" level=info msg="StartContainer for \"e2ad592d3e19de6ad15d6b5b1fd7d3dab86eff027b2951fad28ebdbc1bf2476d\" returns successfully" Jul 12 00:25:52.380449 kubelet[2742]: I0712 00:25:52.380190 2742 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-7bbbb58c8c-q6g54" podStartSLOduration=1.430875888 podStartE2EDuration="4.380167252s" podCreationTimestamp="2025-07-12 00:25:48 +0000 UTC" firstStartedPulling="2025-07-12 00:25:49.101894764 +0000 UTC m=+30.245874006" lastFinishedPulling="2025-07-12 00:25:52.05118614 +0000 UTC m=+33.195165370" observedRunningTime="2025-07-12 00:25:52.377797426 +0000 UTC m=+33.521776692" watchObservedRunningTime="2025-07-12 00:25:52.380167252 +0000 UTC m=+33.524146494" Jul 12 00:25:52.385123 kubelet[2742]: E0712 00:25:52.385079 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:52.385461 kubelet[2742]: W0712 00:25:52.385344 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:52.385714 kubelet[2742]: E0712 00:25:52.385654 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:52.386356 kubelet[2742]: E0712 00:25:52.386323 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:52.386534 kubelet[2742]: W0712 00:25:52.386504 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:52.386708 kubelet[2742]: E0712 00:25:52.386661 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:52.387359 kubelet[2742]: E0712 00:25:52.387326 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:52.387570 kubelet[2742]: W0712 00:25:52.387539 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:52.387853 kubelet[2742]: E0712 00:25:52.387788 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:52.388653 kubelet[2742]: E0712 00:25:52.388605 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:52.388901 kubelet[2742]: W0712 00:25:52.388871 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:52.389070 kubelet[2742]: E0712 00:25:52.389042 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:52.389866 kubelet[2742]: E0712 00:25:52.389835 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:52.390220 kubelet[2742]: W0712 00:25:52.390177 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:52.390364 kubelet[2742]: E0712 00:25:52.390338 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:52.391209 kubelet[2742]: E0712 00:25:52.391165 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:52.391396 kubelet[2742]: W0712 00:25:52.391365 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:52.391556 kubelet[2742]: E0712 00:25:52.391529 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:52.392551 kubelet[2742]: E0712 00:25:52.392225 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:52.392551 kubelet[2742]: W0712 00:25:52.392279 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:52.392551 kubelet[2742]: E0712 00:25:52.392307 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:52.393401 kubelet[2742]: E0712 00:25:52.393355 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:52.393586 kubelet[2742]: W0712 00:25:52.393555 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:52.393776 kubelet[2742]: E0712 00:25:52.393748 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:52.394664 kubelet[2742]: E0712 00:25:52.394630 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:52.395770 kubelet[2742]: W0712 00:25:52.394884 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:52.395770 kubelet[2742]: E0712 00:25:52.394930 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:52.395770 kubelet[2742]: E0712 00:25:52.395471 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:52.395770 kubelet[2742]: W0712 00:25:52.395496 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:52.395770 kubelet[2742]: E0712 00:25:52.395524 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:52.396644 kubelet[2742]: E0712 00:25:52.396608 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:52.396972 kubelet[2742]: W0712 00:25:52.396934 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:52.397129 kubelet[2742]: E0712 00:25:52.397102 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:52.397663 kubelet[2742]: E0712 00:25:52.397616 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:52.397867 kubelet[2742]: W0712 00:25:52.397835 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:52.398001 kubelet[2742]: E0712 00:25:52.397975 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:52.398527 kubelet[2742]: E0712 00:25:52.398497 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:52.398770 kubelet[2742]: W0712 00:25:52.398742 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:52.398901 kubelet[2742]: E0712 00:25:52.398875 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:52.399403 kubelet[2742]: E0712 00:25:52.399374 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:52.399556 kubelet[2742]: W0712 00:25:52.399529 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:52.400156 kubelet[2742]: E0712 00:25:52.400050 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:52.400827 kubelet[2742]: E0712 00:25:52.400793 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:52.401030 kubelet[2742]: W0712 00:25:52.401002 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:52.401179 kubelet[2742]: E0712 00:25:52.401152 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:52.418167 kubelet[2742]: E0712 00:25:52.418130 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:52.418413 kubelet[2742]: W0712 00:25:52.418385 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:52.418575 kubelet[2742]: E0712 00:25:52.418549 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:52.419343 kubelet[2742]: E0712 00:25:52.419304 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:52.419499 kubelet[2742]: W0712 00:25:52.419474 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:52.419650 kubelet[2742]: E0712 00:25:52.419627 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:52.420445 kubelet[2742]: E0712 00:25:52.420381 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:52.421042 kubelet[2742]: W0712 00:25:52.420860 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:52.421864 kubelet[2742]: E0712 00:25:52.421834 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:52.422306 kubelet[2742]: E0712 00:25:52.422279 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:52.422465 kubelet[2742]: W0712 00:25:52.422434 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:52.422603 kubelet[2742]: E0712 00:25:52.422579 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:52.423411 kubelet[2742]: E0712 00:25:52.423378 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:52.423633 kubelet[2742]: W0712 00:25:52.423603 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:52.423850 kubelet[2742]: E0712 00:25:52.423822 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:52.424411 kubelet[2742]: E0712 00:25:52.424381 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:52.424636 kubelet[2742]: W0712 00:25:52.424606 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:52.424872 kubelet[2742]: E0712 00:25:52.424837 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:52.425427 kubelet[2742]: E0712 00:25:52.425402 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:52.425582 kubelet[2742]: W0712 00:25:52.425555 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:52.425767 kubelet[2742]: E0712 00:25:52.425742 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:52.426339 kubelet[2742]: E0712 00:25:52.426311 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:52.426498 kubelet[2742]: W0712 00:25:52.426469 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:52.426697 kubelet[2742]: E0712 00:25:52.426654 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:52.427408 kubelet[2742]: E0712 00:25:52.427373 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:52.427671 kubelet[2742]: W0712 00:25:52.427633 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:52.427997 kubelet[2742]: E0712 00:25:52.427966 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:52.428549 kubelet[2742]: E0712 00:25:52.428518 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:52.428813 kubelet[2742]: W0712 00:25:52.428776 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:52.428980 kubelet[2742]: E0712 00:25:52.428946 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:52.429575 kubelet[2742]: E0712 00:25:52.429543 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:52.429792 kubelet[2742]: W0712 00:25:52.429760 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:52.429999 kubelet[2742]: E0712 00:25:52.429966 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:52.430669 kubelet[2742]: E0712 00:25:52.430635 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:52.431016 kubelet[2742]: W0712 00:25:52.430983 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:52.431213 kubelet[2742]: E0712 00:25:52.431186 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:52.432075 kubelet[2742]: E0712 00:25:52.432049 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:52.432230 kubelet[2742]: W0712 00:25:52.432203 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:52.432361 kubelet[2742]: E0712 00:25:52.432337 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:52.432865 kubelet[2742]: E0712 00:25:52.432842 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:52.433016 kubelet[2742]: W0712 00:25:52.432989 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:52.433184 kubelet[2742]: E0712 00:25:52.433159 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:52.434363 kubelet[2742]: E0712 00:25:52.434328 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:52.434567 kubelet[2742]: W0712 00:25:52.434537 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:52.434739 kubelet[2742]: E0712 00:25:52.434710 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:52.435397 kubelet[2742]: E0712 00:25:52.435363 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:52.435591 kubelet[2742]: W0712 00:25:52.435561 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:52.435801 kubelet[2742]: E0712 00:25:52.435773 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:52.437123 kubelet[2742]: E0712 00:25:52.437086 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:52.437360 kubelet[2742]: W0712 00:25:52.437331 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:52.437498 kubelet[2742]: E0712 00:25:52.437473 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:52.438129 kubelet[2742]: E0712 00:25:52.438100 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:52.438302 kubelet[2742]: W0712 00:25:52.438273 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:52.438430 kubelet[2742]: E0712 00:25:52.438404 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:53.175611 kubelet[2742]: E0712 00:25:53.175083 2742 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-grn85" podUID="be5845dd-212b-4b4e-b99b-9489c28f56b4" Jul 12 00:25:53.335464 env[1733]: time="2025-07-12T00:25:53.335383190Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:25:53.339861 env[1733]: time="2025-07-12T00:25:53.339794767Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:53f638101e3d73f7dd5e42dc42fb3d94ae1978e8958677222c3de6ec1d8c3d4f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:25:53.343522 env[1733]: time="2025-07-12T00:25:53.343469632Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:25:53.347005 env[1733]: time="2025-07-12T00:25:53.346939388Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:972be127eaecd7d1a2d5393b8d14f1ae8f88550bee83e0519e9590c7e15eb41b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:25:53.348657 env[1733]: time="2025-07-12T00:25:53.348585760Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2\" returns image reference \"sha256:53f638101e3d73f7dd5e42dc42fb3d94ae1978e8958677222c3de6ec1d8c3d4f\"" Jul 12 00:25:53.358822 env[1733]: time="2025-07-12T00:25:53.358742805Z" level=info msg="CreateContainer within sandbox \"6577220d5a9b3b976a93bcd3b34d0d37f8ac1e746640e9c4fe5b81a82d33d0dd\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Jul 12 00:25:53.359059 kubelet[2742]: I0712 00:25:53.359016 2742 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 12 00:25:53.390816 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1286910312.mount: Deactivated successfully. Jul 12 00:25:53.403778 env[1733]: time="2025-07-12T00:25:53.403669110Z" level=info msg="CreateContainer within sandbox \"6577220d5a9b3b976a93bcd3b34d0d37f8ac1e746640e9c4fe5b81a82d33d0dd\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"368bb29b3410abbfab54cc8425d6fcbe7502273635bec1b8ecac7ca1827bbc5f\"" Jul 12 00:25:53.405433 env[1733]: time="2025-07-12T00:25:53.405029523Z" level=info msg="StartContainer for \"368bb29b3410abbfab54cc8425d6fcbe7502273635bec1b8ecac7ca1827bbc5f\"" Jul 12 00:25:53.408042 kubelet[2742]: E0712 00:25:53.407787 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:53.408042 kubelet[2742]: W0712 00:25:53.407822 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:53.408042 kubelet[2742]: E0712 00:25:53.407855 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:53.409106 kubelet[2742]: E0712 00:25:53.408866 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:53.409106 kubelet[2742]: W0712 00:25:53.408893 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:53.409106 kubelet[2742]: E0712 00:25:53.408919 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:53.409884 kubelet[2742]: E0712 00:25:53.409617 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:53.409884 kubelet[2742]: W0712 00:25:53.409641 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:53.409884 kubelet[2742]: E0712 00:25:53.409667 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:53.411732 kubelet[2742]: E0712 00:25:53.410268 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:53.411732 kubelet[2742]: W0712 00:25:53.410295 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:53.411732 kubelet[2742]: E0712 00:25:53.411533 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:53.412394 kubelet[2742]: E0712 00:25:53.412364 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:53.412548 kubelet[2742]: W0712 00:25:53.412519 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:53.412712 kubelet[2742]: E0712 00:25:53.412648 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:53.413519 kubelet[2742]: E0712 00:25:53.413485 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:53.413775 kubelet[2742]: W0712 00:25:53.413744 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:53.413915 kubelet[2742]: E0712 00:25:53.413887 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:53.414442 kubelet[2742]: E0712 00:25:53.414414 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:53.414600 kubelet[2742]: W0712 00:25:53.414573 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:53.414781 kubelet[2742]: E0712 00:25:53.414754 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:53.415853 kubelet[2742]: E0712 00:25:53.415821 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:53.416043 kubelet[2742]: W0712 00:25:53.416015 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:53.416733 kubelet[2742]: E0712 00:25:53.416701 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:53.418241 kubelet[2742]: E0712 00:25:53.418194 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:53.418241 kubelet[2742]: W0712 00:25:53.418228 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:53.418241 kubelet[2742]: E0712 00:25:53.418258 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:53.418636 kubelet[2742]: E0712 00:25:53.418600 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:53.418636 kubelet[2742]: W0712 00:25:53.418629 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:53.418827 kubelet[2742]: E0712 00:25:53.418653 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:53.419085 kubelet[2742]: E0712 00:25:53.419048 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:53.419085 kubelet[2742]: W0712 00:25:53.419079 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:53.419264 kubelet[2742]: E0712 00:25:53.419106 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:53.419481 kubelet[2742]: E0712 00:25:53.419447 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:53.419481 kubelet[2742]: W0712 00:25:53.419476 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:53.419615 kubelet[2742]: E0712 00:25:53.419499 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:53.419939 kubelet[2742]: E0712 00:25:53.419903 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:53.419939 kubelet[2742]: W0712 00:25:53.419933 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:53.420082 kubelet[2742]: E0712 00:25:53.419957 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:53.420356 kubelet[2742]: E0712 00:25:53.420320 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:53.420356 kubelet[2742]: W0712 00:25:53.420349 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:53.420530 kubelet[2742]: E0712 00:25:53.420372 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:53.420740 kubelet[2742]: E0712 00:25:53.420668 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:53.420740 kubelet[2742]: W0712 00:25:53.420710 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:53.420892 kubelet[2742]: E0712 00:25:53.420759 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:53.432380 kubelet[2742]: E0712 00:25:53.432250 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:53.432574 kubelet[2742]: W0712 00:25:53.432542 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:53.433613 kubelet[2742]: E0712 00:25:53.433513 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:53.434984 kubelet[2742]: E0712 00:25:53.434949 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:53.435174 kubelet[2742]: W0712 00:25:53.435144 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:53.435384 kubelet[2742]: E0712 00:25:53.435346 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:53.435852 kubelet[2742]: E0712 00:25:53.435816 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:53.435852 kubelet[2742]: W0712 00:25:53.435850 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:53.436181 kubelet[2742]: E0712 00:25:53.435884 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:53.436736 kubelet[2742]: E0712 00:25:53.436695 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:53.436736 kubelet[2742]: W0712 00:25:53.436733 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:53.437276 kubelet[2742]: E0712 00:25:53.436773 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:53.437276 kubelet[2742]: E0712 00:25:53.437198 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:53.437276 kubelet[2742]: W0712 00:25:53.437220 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:53.437570 kubelet[2742]: E0712 00:25:53.437374 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:53.438111 kubelet[2742]: E0712 00:25:53.438061 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:53.438111 kubelet[2742]: W0712 00:25:53.438095 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:53.438479 kubelet[2742]: E0712 00:25:53.438313 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:53.438731 kubelet[2742]: E0712 00:25:53.438634 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:53.438731 kubelet[2742]: W0712 00:25:53.438661 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:53.438970 kubelet[2742]: E0712 00:25:53.438890 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:53.439865 kubelet[2742]: E0712 00:25:53.439828 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:53.439865 kubelet[2742]: W0712 00:25:53.439863 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:53.440087 kubelet[2742]: E0712 00:25:53.440053 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:53.440996 kubelet[2742]: E0712 00:25:53.440955 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:53.440996 kubelet[2742]: W0712 00:25:53.440991 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:53.441267 kubelet[2742]: E0712 00:25:53.441237 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:53.441468 kubelet[2742]: E0712 00:25:53.441350 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:53.441613 kubelet[2742]: W0712 00:25:53.441586 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:53.441869 kubelet[2742]: E0712 00:25:53.441828 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:53.442386 kubelet[2742]: E0712 00:25:53.442356 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:53.442549 kubelet[2742]: W0712 00:25:53.442522 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:53.442840 kubelet[2742]: E0712 00:25:53.442797 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:53.443311 kubelet[2742]: E0712 00:25:53.443283 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:53.443465 kubelet[2742]: W0712 00:25:53.443437 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:53.443669 kubelet[2742]: E0712 00:25:53.443626 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:53.444244 kubelet[2742]: E0712 00:25:53.444214 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:53.444439 kubelet[2742]: W0712 00:25:53.444410 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:53.444623 kubelet[2742]: E0712 00:25:53.444596 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:53.445044 kubelet[2742]: E0712 00:25:53.445003 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:53.445044 kubelet[2742]: W0712 00:25:53.445035 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:53.445214 kubelet[2742]: E0712 00:25:53.445069 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:53.445511 kubelet[2742]: E0712 00:25:53.445481 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:53.445610 kubelet[2742]: W0712 00:25:53.445513 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:53.445610 kubelet[2742]: E0712 00:25:53.445551 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:53.446380 kubelet[2742]: E0712 00:25:53.446349 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:53.446549 kubelet[2742]: W0712 00:25:53.446523 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:53.446753 kubelet[2742]: E0712 00:25:53.446726 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:53.447454 kubelet[2742]: E0712 00:25:53.447418 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:53.447454 kubelet[2742]: W0712 00:25:53.447452 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:53.447772 kubelet[2742]: E0712 00:25:53.447487 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:53.448039 kubelet[2742]: E0712 00:25:53.448008 2742 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 12 00:25:53.448133 kubelet[2742]: W0712 00:25:53.448039 2742 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 12 00:25:53.448133 kubelet[2742]: E0712 00:25:53.448063 2742 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 12 00:25:53.470900 systemd[1]: Started cri-containerd-368bb29b3410abbfab54cc8425d6fcbe7502273635bec1b8ecac7ca1827bbc5f.scope. Jul 12 00:25:53.510000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:53.513016 kernel: kauditd_printk_skb: 179 callbacks suppressed Jul 12 00:25:53.513125 kernel: audit: type=1400 audit(1752279953.510:996): avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:53.510000 audit[3375]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3213 pid=3375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:53.532781 kernel: audit: type=1300 audit(1752279953.510:996): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3213 pid=3375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:53.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336386262323962333431306162626661623534636338343235643666 Jul 12 00:25:53.546335 kernel: audit: type=1327 audit(1752279953.510:996): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336386262323962333431306162626661623534636338343235643666 Jul 12 00:25:53.510000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:53.557353 kernel: audit: type=1400 audit(1752279953.510:997): avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:53.510000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:53.565453 kernel: audit: type=1400 audit(1752279953.510:997): avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:53.510000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:53.573501 kernel: audit: type=1400 audit(1752279953.510:997): avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:53.573633 kernel: audit: type=1400 audit(1752279953.510:997): avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:53.510000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:53.510000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:53.590487 kernel: audit: type=1400 audit(1752279953.510:997): avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:53.510000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:53.600167 kernel: audit: type=1400 audit(1752279953.510:997): avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:53.510000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:53.608578 kernel: audit: type=1400 audit(1752279953.510:997): avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:53.510000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:53.510000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:53.510000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:53.510000 audit: BPF prog-id=133 op=LOAD Jul 12 00:25:53.510000 audit[3375]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3213 pid=3375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:53.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336386262323962333431306162626661623534636338343235643666 Jul 12 00:25:53.512000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:53.512000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:53.512000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:53.512000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:53.512000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:53.512000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:53.512000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:53.512000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:53.512000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:53.512000 audit: BPF prog-id=134 op=LOAD Jul 12 00:25:53.512000 audit[3375]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3213 pid=3375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:53.512000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336386262323962333431306162626661623534636338343235643666 Jul 12 00:25:53.519000 audit: BPF prog-id=134 op=UNLOAD Jul 12 00:25:53.520000 audit: BPF prog-id=133 op=UNLOAD Jul 12 00:25:53.520000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:53.520000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:53.520000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:53.520000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:53.520000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:53.520000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:53.520000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:53.520000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:53.520000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:53.520000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:53.520000 audit: BPF prog-id=135 op=LOAD Jul 12 00:25:53.520000 audit[3375]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3213 pid=3375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:53.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336386262323962333431306162626661623534636338343235643666 Jul 12 00:25:53.611557 env[1733]: time="2025-07-12T00:25:53.609935969Z" level=info msg="StartContainer for \"368bb29b3410abbfab54cc8425d6fcbe7502273635bec1b8ecac7ca1827bbc5f\" returns successfully" Jul 12 00:25:53.635576 systemd[1]: cri-containerd-368bb29b3410abbfab54cc8425d6fcbe7502273635bec1b8ecac7ca1827bbc5f.scope: Deactivated successfully. Jul 12 00:25:53.643000 audit: BPF prog-id=135 op=UNLOAD Jul 12 00:25:54.039450 env[1733]: time="2025-07-12T00:25:54.039379592Z" level=info msg="shim disconnected" id=368bb29b3410abbfab54cc8425d6fcbe7502273635bec1b8ecac7ca1827bbc5f Jul 12 00:25:54.039785 env[1733]: time="2025-07-12T00:25:54.039453721Z" level=warning msg="cleaning up after shim disconnected" id=368bb29b3410abbfab54cc8425d6fcbe7502273635bec1b8ecac7ca1827bbc5f namespace=k8s.io Jul 12 00:25:54.039785 env[1733]: time="2025-07-12T00:25:54.039476523Z" level=info msg="cleaning up dead shim" Jul 12 00:25:54.055162 env[1733]: time="2025-07-12T00:25:54.055034185Z" level=warning msg="cleanup warnings time=\"2025-07-12T00:25:54Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3433 runtime=io.containerd.runc.v2\n" Jul 12 00:25:54.061877 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-368bb29b3410abbfab54cc8425d6fcbe7502273635bec1b8ecac7ca1827bbc5f-rootfs.mount: Deactivated successfully. Jul 12 00:25:54.366285 env[1733]: time="2025-07-12T00:25:54.366142420Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.2\"" Jul 12 00:25:55.155481 kubelet[2742]: I0712 00:25:55.155161 2742 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 12 00:25:55.176370 kubelet[2742]: E0712 00:25:55.176321 2742 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-grn85" podUID="be5845dd-212b-4b4e-b99b-9489c28f56b4" Jul 12 00:25:55.214000 audit[3451]: NETFILTER_CFG table=filter:99 family=2 entries=21 op=nft_register_rule pid=3451 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:25:55.214000 audit[3451]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=7480 a0=3 a1=ffffc6798cd0 a2=0 a3=1 items=0 ppid=2843 pid=3451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:55.214000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:25:55.221000 audit[3451]: NETFILTER_CFG table=nat:100 family=2 entries=19 op=nft_register_chain pid=3451 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:25:55.221000 audit[3451]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6276 a0=3 a1=ffffc6798cd0 a2=0 a3=1 items=0 ppid=2843 pid=3451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:55.221000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:25:57.177388 kubelet[2742]: E0712 00:25:57.177292 2742 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-grn85" podUID="be5845dd-212b-4b4e-b99b-9489c28f56b4" Jul 12 00:25:58.325935 env[1733]: time="2025-07-12T00:25:58.325879966Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:25:58.330066 env[1733]: time="2025-07-12T00:25:58.330016846Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f6e344d58b3c5524e767c7d1dd4cb29c85ce820b0f3005a603532b6a22db5588,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:25:58.332448 env[1733]: time="2025-07-12T00:25:58.332381726Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:25:58.334967 env[1733]: time="2025-07-12T00:25:58.334906565Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:50686775cc60acb78bd92a66fa2d84e1700b2d8e43a718fbadbf35e59baefb4d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:25:58.336320 env[1733]: time="2025-07-12T00:25:58.336272048Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.2\" returns image reference \"sha256:f6e344d58b3c5524e767c7d1dd4cb29c85ce820b0f3005a603532b6a22db5588\"" Jul 12 00:25:58.342813 env[1733]: time="2025-07-12T00:25:58.342750981Z" level=info msg="CreateContainer within sandbox \"6577220d5a9b3b976a93bcd3b34d0d37f8ac1e746640e9c4fe5b81a82d33d0dd\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Jul 12 00:25:58.363312 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1928262082.mount: Deactivated successfully. Jul 12 00:25:58.370302 env[1733]: time="2025-07-12T00:25:58.370235313Z" level=info msg="CreateContainer within sandbox \"6577220d5a9b3b976a93bcd3b34d0d37f8ac1e746640e9c4fe5b81a82d33d0dd\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"1b410b2ed27c5c5b87e8abed57b4cbfe7e129a74b0d73544feae0aaeb916fcc4\"" Jul 12 00:25:58.371516 env[1733]: time="2025-07-12T00:25:58.371464022Z" level=info msg="StartContainer for \"1b410b2ed27c5c5b87e8abed57b4cbfe7e129a74b0d73544feae0aaeb916fcc4\"" Jul 12 00:25:58.428257 systemd[1]: run-containerd-runc-k8s.io-1b410b2ed27c5c5b87e8abed57b4cbfe7e129a74b0d73544feae0aaeb916fcc4-runc.XwhW7O.mount: Deactivated successfully. Jul 12 00:25:58.433042 systemd[1]: Started cri-containerd-1b410b2ed27c5c5b87e8abed57b4cbfe7e129a74b0d73544feae0aaeb916fcc4.scope. Jul 12 00:25:58.472000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:58.472000 audit[3462]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3213 pid=3462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:58.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162343130623265643237633563356238376538616265643537623463 Jul 12 00:25:58.472000 audit[3462]: AVC avc: denied { bpf } for pid=3462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:58.472000 audit[3462]: AVC avc: denied { bpf } for pid=3462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:58.472000 audit[3462]: AVC avc: denied { bpf } for pid=3462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:58.472000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:58.472000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:58.472000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:58.472000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:58.472000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:58.472000 audit[3462]: AVC avc: denied { bpf } for pid=3462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:58.472000 audit[3462]: AVC avc: denied { bpf } for pid=3462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:58.472000 audit: BPF prog-id=136 op=LOAD Jul 12 00:25:58.472000 audit[3462]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3213 pid=3462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:58.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162343130623265643237633563356238376538616265643537623463 Jul 12 00:25:58.472000 audit[3462]: AVC avc: denied { bpf } for pid=3462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:58.472000 audit[3462]: AVC avc: denied { bpf } for pid=3462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:58.472000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:58.472000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:58.472000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:58.472000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:58.472000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:58.472000 audit[3462]: AVC avc: denied { bpf } for pid=3462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:58.472000 audit[3462]: AVC avc: denied { bpf } for pid=3462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:58.472000 audit: BPF prog-id=137 op=LOAD Jul 12 00:25:58.472000 audit[3462]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3213 pid=3462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:58.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162343130623265643237633563356238376538616265643537623463 Jul 12 00:25:58.473000 audit: BPF prog-id=137 op=UNLOAD Jul 12 00:25:58.473000 audit: BPF prog-id=136 op=UNLOAD Jul 12 00:25:58.473000 audit[3462]: AVC avc: denied { bpf } for pid=3462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:58.473000 audit[3462]: AVC avc: denied { bpf } for pid=3462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:58.473000 audit[3462]: AVC avc: denied { bpf } for pid=3462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:58.473000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:58.473000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:58.473000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:58.473000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:58.473000 audit[3462]: AVC avc: denied { perfmon } for pid=3462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:58.473000 audit[3462]: AVC avc: denied { bpf } for pid=3462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:58.473000 audit[3462]: AVC avc: denied { bpf } for pid=3462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:25:58.473000 audit: BPF prog-id=138 op=LOAD Jul 12 00:25:58.473000 audit[3462]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3213 pid=3462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:25:58.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162343130623265643237633563356238376538616265643537623463 Jul 12 00:25:58.501545 env[1733]: time="2025-07-12T00:25:58.501464237Z" level=info msg="StartContainer for \"1b410b2ed27c5c5b87e8abed57b4cbfe7e129a74b0d73544feae0aaeb916fcc4\" returns successfully" Jul 12 00:25:59.175812 kubelet[2742]: E0712 00:25:59.175755 2742 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-grn85" podUID="be5845dd-212b-4b4e-b99b-9489c28f56b4" Jul 12 00:25:59.662375 env[1733]: time="2025-07-12T00:25:59.662298447Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 12 00:25:59.667724 systemd[1]: cri-containerd-1b410b2ed27c5c5b87e8abed57b4cbfe7e129a74b0d73544feae0aaeb916fcc4.scope: Deactivated successfully. Jul 12 00:25:59.668262 systemd[1]: cri-containerd-1b410b2ed27c5c5b87e8abed57b4cbfe7e129a74b0d73544feae0aaeb916fcc4.scope: Consumed 1.070s CPU time. Jul 12 00:25:59.674873 kernel: kauditd_printk_skb: 83 callbacks suppressed Jul 12 00:25:59.675036 kernel: audit: type=1334 audit(1752279959.671:1011): prog-id=138 op=UNLOAD Jul 12 00:25:59.671000 audit: BPF prog-id=138 op=UNLOAD Jul 12 00:25:59.684631 kubelet[2742]: I0712 00:25:59.683204 2742 kubelet_node_status.go:488] "Fast updating node status as it just became ready" Jul 12 00:25:59.739464 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-1b410b2ed27c5c5b87e8abed57b4cbfe7e129a74b0d73544feae0aaeb916fcc4-rootfs.mount: Deactivated successfully. Jul 12 00:25:59.761496 systemd[1]: Created slice kubepods-burstable-pod4f42c96b_24be_48e4_ba92_a05f74184848.slice. Jul 12 00:25:59.793520 systemd[1]: Created slice kubepods-besteffort-pod7c6c2194_2c72_4a54_9fb8_bf2e357a0987.slice. Jul 12 00:25:59.817432 systemd[1]: Created slice kubepods-burstable-pod17e5c7cc_19eb_4973_833d_c011599b9537.slice. Jul 12 00:25:59.851920 systemd[1]: Created slice kubepods-besteffort-pod288994cc_ff1d_4a1a_a404_e0b6cf8e19f6.slice. Jul 12 00:25:59.891180 systemd[1]: Created slice kubepods-besteffort-podd10fda65_1669_431d_92ec_3a2ad1e452f9.slice. Jul 12 00:25:59.915792 kubelet[2742]: I0712 00:25:59.893356 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cz7qf\" (UniqueName: \"kubernetes.io/projected/7c6c2194-2c72-4a54-9fb8-bf2e357a0987-kube-api-access-cz7qf\") pod \"calico-kube-controllers-5c48f86fdd-72x89\" (UID: \"7c6c2194-2c72-4a54-9fb8-bf2e357a0987\") " pod="calico-system/calico-kube-controllers-5c48f86fdd-72x89" Jul 12 00:25:59.915792 kubelet[2742]: I0712 00:25:59.893425 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/17e5c7cc-19eb-4973-833d-c011599b9537-config-volume\") pod \"coredns-7c65d6cfc9-5lbr6\" (UID: \"17e5c7cc-19eb-4973-833d-c011599b9537\") " pod="kube-system/coredns-7c65d6cfc9-5lbr6" Jul 12 00:25:59.915792 kubelet[2742]: I0712 00:25:59.893469 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/4f42c96b-24be-48e4-ba92-a05f74184848-config-volume\") pod \"coredns-7c65d6cfc9-rtg8v\" (UID: \"4f42c96b-24be-48e4-ba92-a05f74184848\") " pod="kube-system/coredns-7c65d6cfc9-rtg8v" Jul 12 00:25:59.915792 kubelet[2742]: I0712 00:25:59.893511 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tbkrg\" (UniqueName: \"kubernetes.io/projected/288994cc-ff1d-4a1a-a404-e0b6cf8e19f6-kube-api-access-tbkrg\") pod \"calico-apiserver-b5644b9bf-tg2s7\" (UID: \"288994cc-ff1d-4a1a-a404-e0b6cf8e19f6\") " pod="calico-apiserver/calico-apiserver-b5644b9bf-tg2s7" Jul 12 00:25:59.915792 kubelet[2742]: I0712 00:25:59.893552 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cx7j2\" (UniqueName: \"kubernetes.io/projected/4f42c96b-24be-48e4-ba92-a05f74184848-kube-api-access-cx7j2\") pod \"coredns-7c65d6cfc9-rtg8v\" (UID: \"4f42c96b-24be-48e4-ba92-a05f74184848\") " pod="kube-system/coredns-7c65d6cfc9-rtg8v" Jul 12 00:25:59.916877 kubelet[2742]: I0712 00:25:59.893592 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/7c6c2194-2c72-4a54-9fb8-bf2e357a0987-tigera-ca-bundle\") pod \"calico-kube-controllers-5c48f86fdd-72x89\" (UID: \"7c6c2194-2c72-4a54-9fb8-bf2e357a0987\") " pod="calico-system/calico-kube-controllers-5c48f86fdd-72x89" Jul 12 00:25:59.916877 kubelet[2742]: I0712 00:25:59.893628 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hn2r8\" (UniqueName: \"kubernetes.io/projected/17e5c7cc-19eb-4973-833d-c011599b9537-kube-api-access-hn2r8\") pod \"coredns-7c65d6cfc9-5lbr6\" (UID: \"17e5c7cc-19eb-4973-833d-c011599b9537\") " pod="kube-system/coredns-7c65d6cfc9-5lbr6" Jul 12 00:25:59.916877 kubelet[2742]: I0712 00:25:59.893705 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/288994cc-ff1d-4a1a-a404-e0b6cf8e19f6-calico-apiserver-certs\") pod \"calico-apiserver-b5644b9bf-tg2s7\" (UID: \"288994cc-ff1d-4a1a-a404-e0b6cf8e19f6\") " pod="calico-apiserver/calico-apiserver-b5644b9bf-tg2s7" Jul 12 00:25:59.916510 systemd[1]: Created slice kubepods-besteffort-pod1de9e718_b4cc_4c55_aca5_2a9b50b71c00.slice. Jul 12 00:25:59.929738 systemd[1]: Created slice kubepods-besteffort-pode3812f81_11a9_4dfb_a0f5_cf6c3ca45a4d.slice. Jul 12 00:25:59.995044 kubelet[2742]: I0712 00:25:59.994983 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-key-pair\" (UniqueName: \"kubernetes.io/secret/1de9e718-b4cc-4c55-aca5-2a9b50b71c00-goldmane-key-pair\") pod \"goldmane-58fd7646b9-rmlz5\" (UID: \"1de9e718-b4cc-4c55-aca5-2a9b50b71c00\") " pod="calico-system/goldmane-58fd7646b9-rmlz5" Jul 12 00:26:00.013498 kubelet[2742]: I0712 00:25:59.997259 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d10fda65-1669-431d-92ec-3a2ad1e452f9-whisker-ca-bundle\") pod \"whisker-694fcf6c96-9tks2\" (UID: \"d10fda65-1669-431d-92ec-3a2ad1e452f9\") " pod="calico-system/whisker-694fcf6c96-9tks2" Jul 12 00:26:00.013498 kubelet[2742]: I0712 00:25:59.997322 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1de9e718-b4cc-4c55-aca5-2a9b50b71c00-goldmane-ca-bundle\") pod \"goldmane-58fd7646b9-rmlz5\" (UID: \"1de9e718-b4cc-4c55-aca5-2a9b50b71c00\") " pod="calico-system/goldmane-58fd7646b9-rmlz5" Jul 12 00:26:00.013498 kubelet[2742]: I0712 00:25:59.997369 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jbzg4\" (UniqueName: \"kubernetes.io/projected/e3812f81-11a9-4dfb-a0f5-cf6c3ca45a4d-kube-api-access-jbzg4\") pod \"calico-apiserver-b5644b9bf-kx5cn\" (UID: \"e3812f81-11a9-4dfb-a0f5-cf6c3ca45a4d\") " pod="calico-apiserver/calico-apiserver-b5644b9bf-kx5cn" Jul 12 00:26:00.013498 kubelet[2742]: I0712 00:25:59.997533 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-t68f9\" (UniqueName: \"kubernetes.io/projected/1de9e718-b4cc-4c55-aca5-2a9b50b71c00-kube-api-access-t68f9\") pod \"goldmane-58fd7646b9-rmlz5\" (UID: \"1de9e718-b4cc-4c55-aca5-2a9b50b71c00\") " pod="calico-system/goldmane-58fd7646b9-rmlz5" Jul 12 00:26:00.013498 kubelet[2742]: I0712 00:25:59.997664 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/d10fda65-1669-431d-92ec-3a2ad1e452f9-whisker-backend-key-pair\") pod \"whisker-694fcf6c96-9tks2\" (UID: \"d10fda65-1669-431d-92ec-3a2ad1e452f9\") " pod="calico-system/whisker-694fcf6c96-9tks2" Jul 12 00:26:00.013922 kubelet[2742]: I0712 00:25:59.998650 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xtfwk\" (UniqueName: \"kubernetes.io/projected/d10fda65-1669-431d-92ec-3a2ad1e452f9-kube-api-access-xtfwk\") pod \"whisker-694fcf6c96-9tks2\" (UID: \"d10fda65-1669-431d-92ec-3a2ad1e452f9\") " pod="calico-system/whisker-694fcf6c96-9tks2" Jul 12 00:26:00.013922 kubelet[2742]: I0712 00:25:59.998799 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config\" (UniqueName: \"kubernetes.io/configmap/1de9e718-b4cc-4c55-aca5-2a9b50b71c00-config\") pod \"goldmane-58fd7646b9-rmlz5\" (UID: \"1de9e718-b4cc-4c55-aca5-2a9b50b71c00\") " pod="calico-system/goldmane-58fd7646b9-rmlz5" Jul 12 00:26:00.013922 kubelet[2742]: I0712 00:25:59.998868 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/e3812f81-11a9-4dfb-a0f5-cf6c3ca45a4d-calico-apiserver-certs\") pod \"calico-apiserver-b5644b9bf-kx5cn\" (UID: \"e3812f81-11a9-4dfb-a0f5-cf6c3ca45a4d\") " pod="calico-apiserver/calico-apiserver-b5644b9bf-kx5cn" Jul 12 00:26:00.114114 env[1733]: time="2025-07-12T00:26:00.114020231Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5c48f86fdd-72x89,Uid:7c6c2194-2c72-4a54-9fb8-bf2e357a0987,Namespace:calico-system,Attempt:0,}" Jul 12 00:26:00.165645 env[1733]: time="2025-07-12T00:26:00.165580016Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-5lbr6,Uid:17e5c7cc-19eb-4973-833d-c011599b9537,Namespace:kube-system,Attempt:0,}" Jul 12 00:26:00.175180 env[1733]: time="2025-07-12T00:26:00.175008617Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-b5644b9bf-tg2s7,Uid:288994cc-ff1d-4a1a-a404-e0b6cf8e19f6,Namespace:calico-apiserver,Attempt:0,}" Jul 12 00:26:00.200719 env[1733]: time="2025-07-12T00:26:00.200564693Z" level=info msg="shim disconnected" id=1b410b2ed27c5c5b87e8abed57b4cbfe7e129a74b0d73544feae0aaeb916fcc4 Jul 12 00:26:00.200719 env[1733]: time="2025-07-12T00:26:00.200715184Z" level=warning msg="cleaning up after shim disconnected" id=1b410b2ed27c5c5b87e8abed57b4cbfe7e129a74b0d73544feae0aaeb916fcc4 namespace=k8s.io Jul 12 00:26:00.200973 env[1733]: time="2025-07-12T00:26:00.200738826Z" level=info msg="cleaning up dead shim" Jul 12 00:26:00.215964 env[1733]: time="2025-07-12T00:26:00.215896645Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-694fcf6c96-9tks2,Uid:d10fda65-1669-431d-92ec-3a2ad1e452f9,Namespace:calico-system,Attempt:0,}" Jul 12 00:26:00.224828 env[1733]: time="2025-07-12T00:26:00.224549066Z" level=warning msg="cleanup warnings time=\"2025-07-12T00:26:00Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3514 runtime=io.containerd.runc.v2\n" Jul 12 00:26:00.239921 env[1733]: time="2025-07-12T00:26:00.239857628Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-58fd7646b9-rmlz5,Uid:1de9e718-b4cc-4c55-aca5-2a9b50b71c00,Namespace:calico-system,Attempt:0,}" Jul 12 00:26:00.245785 env[1733]: time="2025-07-12T00:26:00.245669388Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-b5644b9bf-kx5cn,Uid:e3812f81-11a9-4dfb-a0f5-cf6c3ca45a4d,Namespace:calico-apiserver,Attempt:0,}" Jul 12 00:26:00.386582 env[1733]: time="2025-07-12T00:26:00.386511581Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-rtg8v,Uid:4f42c96b-24be-48e4-ba92-a05f74184848,Namespace:kube-system,Attempt:0,}" Jul 12 00:26:00.428192 env[1733]: time="2025-07-12T00:26:00.428022561Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.2\"" Jul 12 00:26:00.649905 env[1733]: time="2025-07-12T00:26:00.649809535Z" level=error msg="Failed to destroy network for sandbox \"8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:26:00.651025 env[1733]: time="2025-07-12T00:26:00.650948200Z" level=error msg="encountered an error cleaning up failed sandbox \"8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:26:00.651330 env[1733]: time="2025-07-12T00:26:00.651272739Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-b5644b9bf-tg2s7,Uid:288994cc-ff1d-4a1a-a404-e0b6cf8e19f6,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:26:00.651941 kubelet[2742]: E0712 00:26:00.651863 2742 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:26:00.652603 kubelet[2742]: E0712 00:26:00.651976 2742 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-b5644b9bf-tg2s7" Jul 12 00:26:00.652603 kubelet[2742]: E0712 00:26:00.652011 2742 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-b5644b9bf-tg2s7" Jul 12 00:26:00.652603 kubelet[2742]: E0712 00:26:00.652087 2742 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-b5644b9bf-tg2s7_calico-apiserver(288994cc-ff1d-4a1a-a404-e0b6cf8e19f6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-b5644b9bf-tg2s7_calico-apiserver(288994cc-ff1d-4a1a-a404-e0b6cf8e19f6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-b5644b9bf-tg2s7" podUID="288994cc-ff1d-4a1a-a404-e0b6cf8e19f6" Jul 12 00:26:00.687404 env[1733]: time="2025-07-12T00:26:00.687242242Z" level=error msg="Failed to destroy network for sandbox \"c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:26:00.689134 env[1733]: time="2025-07-12T00:26:00.689055691Z" level=error msg="encountered an error cleaning up failed sandbox \"c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:26:00.689416 env[1733]: time="2025-07-12T00:26:00.689358556Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-5lbr6,Uid:17e5c7cc-19eb-4973-833d-c011599b9537,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:26:00.689917 kubelet[2742]: E0712 00:26:00.689838 2742 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:26:00.690092 kubelet[2742]: E0712 00:26:00.689923 2742 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-5lbr6" Jul 12 00:26:00.690092 kubelet[2742]: E0712 00:26:00.689957 2742 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-5lbr6" Jul 12 00:26:00.690092 kubelet[2742]: E0712 00:26:00.690031 2742 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7c65d6cfc9-5lbr6_kube-system(17e5c7cc-19eb-4973-833d-c011599b9537)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7c65d6cfc9-5lbr6_kube-system(17e5c7cc-19eb-4973-833d-c011599b9537)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-5lbr6" podUID="17e5c7cc-19eb-4973-833d-c011599b9537" Jul 12 00:26:00.719945 env[1733]: time="2025-07-12T00:26:00.719861408Z" level=error msg="Failed to destroy network for sandbox \"25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:26:00.720913 env[1733]: time="2025-07-12T00:26:00.720841769Z" level=error msg="encountered an error cleaning up failed sandbox \"25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:26:00.721453 env[1733]: time="2025-07-12T00:26:00.721389776Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-694fcf6c96-9tks2,Uid:d10fda65-1669-431d-92ec-3a2ad1e452f9,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:26:00.722778 kubelet[2742]: E0712 00:26:00.722077 2742 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:26:00.722778 kubelet[2742]: E0712 00:26:00.722178 2742 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-694fcf6c96-9tks2" Jul 12 00:26:00.722778 kubelet[2742]: E0712 00:26:00.722213 2742 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-694fcf6c96-9tks2" Jul 12 00:26:00.723109 kubelet[2742]: E0712 00:26:00.722660 2742 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"whisker-694fcf6c96-9tks2_calico-system(d10fda65-1669-431d-92ec-3a2ad1e452f9)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"whisker-694fcf6c96-9tks2_calico-system(d10fda65-1669-431d-92ec-3a2ad1e452f9)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-694fcf6c96-9tks2" podUID="d10fda65-1669-431d-92ec-3a2ad1e452f9" Jul 12 00:26:00.730987 env[1733]: time="2025-07-12T00:26:00.730910315Z" level=error msg="Failed to destroy network for sandbox \"808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:26:00.731928 env[1733]: time="2025-07-12T00:26:00.731862823Z" level=error msg="encountered an error cleaning up failed sandbox \"808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:26:00.732223 env[1733]: time="2025-07-12T00:26:00.732169313Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-58fd7646b9-rmlz5,Uid:1de9e718-b4cc-4c55-aca5-2a9b50b71c00,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:26:00.732818 kubelet[2742]: E0712 00:26:00.732753 2742 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:26:00.733044 kubelet[2742]: E0712 00:26:00.732839 2742 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-58fd7646b9-rmlz5" Jul 12 00:26:00.733044 kubelet[2742]: E0712 00:26:00.732873 2742 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-58fd7646b9-rmlz5" Jul 12 00:26:00.733044 kubelet[2742]: E0712 00:26:00.733000 2742 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"goldmane-58fd7646b9-rmlz5_calico-system(1de9e718-b4cc-4c55-aca5-2a9b50b71c00)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"goldmane-58fd7646b9-rmlz5_calico-system(1de9e718-b4cc-4c55-aca5-2a9b50b71c00)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-58fd7646b9-rmlz5" podUID="1de9e718-b4cc-4c55-aca5-2a9b50b71c00" Jul 12 00:26:00.786502 env[1733]: time="2025-07-12T00:26:00.786426769Z" level=error msg="Failed to destroy network for sandbox \"6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:26:00.791305 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b-shm.mount: Deactivated successfully. Jul 12 00:26:00.793876 env[1733]: time="2025-07-12T00:26:00.793794043Z" level=error msg="Failed to destroy network for sandbox \"13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:26:00.794672 env[1733]: time="2025-07-12T00:26:00.794600921Z" level=error msg="encountered an error cleaning up failed sandbox \"6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:26:00.797410 env[1733]: time="2025-07-12T00:26:00.797333058Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5c48f86fdd-72x89,Uid:7c6c2194-2c72-4a54-9fb8-bf2e357a0987,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:26:00.798981 kubelet[2742]: E0712 00:26:00.798903 2742 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:26:00.799189 kubelet[2742]: E0712 00:26:00.798994 2742 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5c48f86fdd-72x89" Jul 12 00:26:00.799189 kubelet[2742]: E0712 00:26:00.799033 2742 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5c48f86fdd-72x89" Jul 12 00:26:00.799189 kubelet[2742]: E0712 00:26:00.799135 2742 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-5c48f86fdd-72x89_calico-system(7c6c2194-2c72-4a54-9fb8-bf2e357a0987)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-5c48f86fdd-72x89_calico-system(7c6c2194-2c72-4a54-9fb8-bf2e357a0987)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5c48f86fdd-72x89" podUID="7c6c2194-2c72-4a54-9fb8-bf2e357a0987" Jul 12 00:26:00.805545 env[1733]: time="2025-07-12T00:26:00.805449966Z" level=error msg="Failed to destroy network for sandbox \"10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:26:00.813724 env[1733]: time="2025-07-12T00:26:00.808642073Z" level=error msg="encountered an error cleaning up failed sandbox \"10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:26:00.813724 env[1733]: time="2025-07-12T00:26:00.808771442Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-b5644b9bf-kx5cn,Uid:e3812f81-11a9-4dfb-a0f5-cf6c3ca45a4d,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:26:00.813724 env[1733]: time="2025-07-12T00:26:00.810347465Z" level=error msg="encountered an error cleaning up failed sandbox \"13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:26:00.813724 env[1733]: time="2025-07-12T00:26:00.810446040Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-rtg8v,Uid:4f42c96b-24be-48e4-ba92-a05f74184848,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:26:00.811335 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd-shm.mount: Deactivated successfully. Jul 12 00:26:00.816025 kubelet[2742]: E0712 00:26:00.814904 2742 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:26:00.816025 kubelet[2742]: E0712 00:26:00.815084 2742 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-b5644b9bf-kx5cn" Jul 12 00:26:00.816025 kubelet[2742]: E0712 00:26:00.815140 2742 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-b5644b9bf-kx5cn" Jul 12 00:26:00.816405 kubelet[2742]: E0712 00:26:00.815204 2742 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-b5644b9bf-kx5cn_calico-apiserver(e3812f81-11a9-4dfb-a0f5-cf6c3ca45a4d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-b5644b9bf-kx5cn_calico-apiserver(e3812f81-11a9-4dfb-a0f5-cf6c3ca45a4d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-b5644b9bf-kx5cn" podUID="e3812f81-11a9-4dfb-a0f5-cf6c3ca45a4d" Jul 12 00:26:00.816405 kubelet[2742]: E0712 00:26:00.814845 2742 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:26:00.817903 kubelet[2742]: E0712 00:26:00.817399 2742 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-rtg8v" Jul 12 00:26:00.817903 kubelet[2742]: E0712 00:26:00.817492 2742 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-rtg8v" Jul 12 00:26:00.817903 kubelet[2742]: E0712 00:26:00.817774 2742 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7c65d6cfc9-rtg8v_kube-system(4f42c96b-24be-48e4-ba92-a05f74184848)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7c65d6cfc9-rtg8v_kube-system(4f42c96b-24be-48e4-ba92-a05f74184848)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-rtg8v" podUID="4f42c96b-24be-48e4-ba92-a05f74184848" Jul 12 00:26:00.819046 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8-shm.mount: Deactivated successfully. Jul 12 00:26:01.187494 systemd[1]: Created slice kubepods-besteffort-podbe5845dd_212b_4b4e_b99b_9489c28f56b4.slice. Jul 12 00:26:01.192567 env[1733]: time="2025-07-12T00:26:01.192488585Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-grn85,Uid:be5845dd-212b-4b4e-b99b-9489c28f56b4,Namespace:calico-system,Attempt:0,}" Jul 12 00:26:01.314174 env[1733]: time="2025-07-12T00:26:01.314095860Z" level=error msg="Failed to destroy network for sandbox \"0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:26:01.315019 env[1733]: time="2025-07-12T00:26:01.314962837Z" level=error msg="encountered an error cleaning up failed sandbox \"0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:26:01.315256 env[1733]: time="2025-07-12T00:26:01.315191789Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-grn85,Uid:be5845dd-212b-4b4e-b99b-9489c28f56b4,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:26:01.315876 kubelet[2742]: E0712 00:26:01.315623 2742 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:26:01.315876 kubelet[2742]: E0712 00:26:01.315720 2742 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-grn85" Jul 12 00:26:01.315876 kubelet[2742]: E0712 00:26:01.315777 2742 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-grn85" Jul 12 00:26:01.317960 kubelet[2742]: E0712 00:26:01.317840 2742 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-grn85_calico-system(be5845dd-212b-4b4e-b99b-9489c28f56b4)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-grn85_calico-system(be5845dd-212b-4b4e-b99b-9489c28f56b4)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-grn85" podUID="be5845dd-212b-4b4e-b99b-9489c28f56b4" Jul 12 00:26:01.425872 kubelet[2742]: I0712 00:26:01.425826 2742 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b" Jul 12 00:26:01.429316 env[1733]: time="2025-07-12T00:26:01.429265787Z" level=info msg="StopPodSandbox for \"6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b\"" Jul 12 00:26:01.433372 kubelet[2742]: I0712 00:26:01.433329 2742 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26" Jul 12 00:26:01.435136 env[1733]: time="2025-07-12T00:26:01.435053302Z" level=info msg="StopPodSandbox for \"808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26\"" Jul 12 00:26:01.438364 kubelet[2742]: I0712 00:26:01.438165 2742 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8" Jul 12 00:26:01.444072 env[1733]: time="2025-07-12T00:26:01.443930229Z" level=info msg="StopPodSandbox for \"10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8\"" Jul 12 00:26:01.448294 kubelet[2742]: I0712 00:26:01.448246 2742 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa" Jul 12 00:26:01.450477 env[1733]: time="2025-07-12T00:26:01.450386502Z" level=info msg="StopPodSandbox for \"c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa\"" Jul 12 00:26:01.453163 kubelet[2742]: I0712 00:26:01.452869 2742 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85" Jul 12 00:26:01.454793 env[1733]: time="2025-07-12T00:26:01.454671679Z" level=info msg="StopPodSandbox for \"8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85\"" Jul 12 00:26:01.460101 kubelet[2742]: I0712 00:26:01.460012 2742 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a" Jul 12 00:26:01.462464 env[1733]: time="2025-07-12T00:26:01.462367256Z" level=info msg="StopPodSandbox for \"25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a\"" Jul 12 00:26:01.464738 kubelet[2742]: I0712 00:26:01.464093 2742 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7" Jul 12 00:26:01.465460 env[1733]: time="2025-07-12T00:26:01.465369422Z" level=info msg="StopPodSandbox for \"0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7\"" Jul 12 00:26:01.470283 kubelet[2742]: I0712 00:26:01.469630 2742 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd" Jul 12 00:26:01.470810 env[1733]: time="2025-07-12T00:26:01.470758677Z" level=info msg="StopPodSandbox for \"13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd\"" Jul 12 00:26:01.541810 env[1733]: time="2025-07-12T00:26:01.541649587Z" level=error msg="StopPodSandbox for \"808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26\" failed" error="failed to destroy network for sandbox \"808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:26:01.542472 kubelet[2742]: E0712 00:26:01.542199 2742 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26" Jul 12 00:26:01.542472 kubelet[2742]: E0712 00:26:01.542286 2742 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26"} Jul 12 00:26:01.542472 kubelet[2742]: E0712 00:26:01.542368 2742 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1de9e718-b4cc-4c55-aca5-2a9b50b71c00\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 12 00:26:01.542472 kubelet[2742]: E0712 00:26:01.542416 2742 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1de9e718-b4cc-4c55-aca5-2a9b50b71c00\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-58fd7646b9-rmlz5" podUID="1de9e718-b4cc-4c55-aca5-2a9b50b71c00" Jul 12 00:26:01.671774 env[1733]: time="2025-07-12T00:26:01.671662108Z" level=error msg="StopPodSandbox for \"6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b\" failed" error="failed to destroy network for sandbox \"6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:26:01.672227 kubelet[2742]: E0712 00:26:01.672130 2742 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b" Jul 12 00:26:01.672785 kubelet[2742]: E0712 00:26:01.672239 2742 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b"} Jul 12 00:26:01.672785 kubelet[2742]: E0712 00:26:01.672321 2742 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7c6c2194-2c72-4a54-9fb8-bf2e357a0987\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 12 00:26:01.672785 kubelet[2742]: E0712 00:26:01.672386 2742 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7c6c2194-2c72-4a54-9fb8-bf2e357a0987\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5c48f86fdd-72x89" podUID="7c6c2194-2c72-4a54-9fb8-bf2e357a0987" Jul 12 00:26:01.694068 env[1733]: time="2025-07-12T00:26:01.693889661Z" level=error msg="StopPodSandbox for \"c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa\" failed" error="failed to destroy network for sandbox \"c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:26:01.695987 kubelet[2742]: E0712 00:26:01.695870 2742 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa" Jul 12 00:26:01.696149 kubelet[2742]: E0712 00:26:01.696005 2742 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa"} Jul 12 00:26:01.696149 kubelet[2742]: E0712 00:26:01.696091 2742 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"17e5c7cc-19eb-4973-833d-c011599b9537\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 12 00:26:01.696330 kubelet[2742]: E0712 00:26:01.696135 2742 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"17e5c7cc-19eb-4973-833d-c011599b9537\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-5lbr6" podUID="17e5c7cc-19eb-4973-833d-c011599b9537" Jul 12 00:26:01.700557 env[1733]: time="2025-07-12T00:26:01.700461922Z" level=error msg="StopPodSandbox for \"25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a\" failed" error="failed to destroy network for sandbox \"25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:26:01.700979 kubelet[2742]: E0712 00:26:01.700891 2742 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a" Jul 12 00:26:01.701098 kubelet[2742]: E0712 00:26:01.700990 2742 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a"} Jul 12 00:26:01.701098 kubelet[2742]: E0712 00:26:01.701073 2742 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d10fda65-1669-431d-92ec-3a2ad1e452f9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 12 00:26:01.701283 kubelet[2742]: E0712 00:26:01.701140 2742 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d10fda65-1669-431d-92ec-3a2ad1e452f9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-694fcf6c96-9tks2" podUID="d10fda65-1669-431d-92ec-3a2ad1e452f9" Jul 12 00:26:01.741507 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7-shm.mount: Deactivated successfully. Jul 12 00:26:01.796627 env[1733]: time="2025-07-12T00:26:01.796547437Z" level=error msg="StopPodSandbox for \"10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8\" failed" error="failed to destroy network for sandbox \"10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:26:01.797331 kubelet[2742]: E0712 00:26:01.797237 2742 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8" Jul 12 00:26:01.797467 kubelet[2742]: E0712 00:26:01.797340 2742 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8"} Jul 12 00:26:01.797467 kubelet[2742]: E0712 00:26:01.797417 2742 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e3812f81-11a9-4dfb-a0f5-cf6c3ca45a4d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 12 00:26:01.797661 kubelet[2742]: E0712 00:26:01.797490 2742 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e3812f81-11a9-4dfb-a0f5-cf6c3ca45a4d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-b5644b9bf-kx5cn" podUID="e3812f81-11a9-4dfb-a0f5-cf6c3ca45a4d" Jul 12 00:26:01.823769 env[1733]: time="2025-07-12T00:26:01.823662825Z" level=error msg="StopPodSandbox for \"8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85\" failed" error="failed to destroy network for sandbox \"8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:26:01.824372 kubelet[2742]: E0712 00:26:01.824289 2742 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85" Jul 12 00:26:01.824534 kubelet[2742]: E0712 00:26:01.824388 2742 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85"} Jul 12 00:26:01.824534 kubelet[2742]: E0712 00:26:01.824468 2742 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"288994cc-ff1d-4a1a-a404-e0b6cf8e19f6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 12 00:26:01.824839 kubelet[2742]: E0712 00:26:01.824541 2742 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"288994cc-ff1d-4a1a-a404-e0b6cf8e19f6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-b5644b9bf-tg2s7" podUID="288994cc-ff1d-4a1a-a404-e0b6cf8e19f6" Jul 12 00:26:01.829986 env[1733]: time="2025-07-12T00:26:01.829906767Z" level=error msg="StopPodSandbox for \"13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd\" failed" error="failed to destroy network for sandbox \"13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:26:01.830666 kubelet[2742]: E0712 00:26:01.830501 2742 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd" Jul 12 00:26:01.830666 kubelet[2742]: E0712 00:26:01.830643 2742 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd"} Jul 12 00:26:01.830915 kubelet[2742]: E0712 00:26:01.830737 2742 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4f42c96b-24be-48e4-ba92-a05f74184848\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 12 00:26:01.830915 kubelet[2742]: E0712 00:26:01.830801 2742 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4f42c96b-24be-48e4-ba92-a05f74184848\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-rtg8v" podUID="4f42c96b-24be-48e4-ba92-a05f74184848" Jul 12 00:26:01.831499 env[1733]: time="2025-07-12T00:26:01.831432351Z" level=error msg="StopPodSandbox for \"0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7\" failed" error="failed to destroy network for sandbox \"0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 12 00:26:01.832055 kubelet[2742]: E0712 00:26:01.831959 2742 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7" Jul 12 00:26:01.832171 kubelet[2742]: E0712 00:26:01.832060 2742 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7"} Jul 12 00:26:01.832326 kubelet[2742]: E0712 00:26:01.832289 2742 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"be5845dd-212b-4b4e-b99b-9489c28f56b4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 12 00:26:01.832445 kubelet[2742]: E0712 00:26:01.832343 2742 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"be5845dd-212b-4b4e-b99b-9489c28f56b4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-grn85" podUID="be5845dd-212b-4b4e-b99b-9489c28f56b4" Jul 12 00:26:08.754977 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2479553818.mount: Deactivated successfully. Jul 12 00:26:08.815365 env[1733]: time="2025-07-12T00:26:08.815305659Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:26:08.819770 env[1733]: time="2025-07-12T00:26:08.819716990Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1c6ddca599ddd18c061e797a7830b0aea985f8b023c5e43d815a9ed1088893a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:26:08.823393 env[1733]: time="2025-07-12T00:26:08.823319321Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:26:08.827407 env[1733]: time="2025-07-12T00:26:08.827338260Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e94d49349cc361ef2216d27dda4a097278984d778279f66e79b0616c827c6760,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:26:08.828984 env[1733]: time="2025-07-12T00:26:08.828913313Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.2\" returns image reference \"sha256:1c6ddca599ddd18c061e797a7830b0aea985f8b023c5e43d815a9ed1088893a9\"" Jul 12 00:26:08.861175 env[1733]: time="2025-07-12T00:26:08.861090094Z" level=info msg="CreateContainer within sandbox \"6577220d5a9b3b976a93bcd3b34d0d37f8ac1e746640e9c4fe5b81a82d33d0dd\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Jul 12 00:26:08.897307 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount890470012.mount: Deactivated successfully. Jul 12 00:26:08.903524 env[1733]: time="2025-07-12T00:26:08.903399048Z" level=info msg="CreateContainer within sandbox \"6577220d5a9b3b976a93bcd3b34d0d37f8ac1e746640e9c4fe5b81a82d33d0dd\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"ce7f000cb5fd3fc6dc9878fadc29e9c96c86d05c2e400f262d530a55f62cf03b\"" Jul 12 00:26:08.905355 env[1733]: time="2025-07-12T00:26:08.905281032Z" level=info msg="StartContainer for \"ce7f000cb5fd3fc6dc9878fadc29e9c96c86d05c2e400f262d530a55f62cf03b\"" Jul 12 00:26:08.938985 systemd[1]: Started cri-containerd-ce7f000cb5fd3fc6dc9878fadc29e9c96c86d05c2e400f262d530a55f62cf03b.scope. Jul 12 00:26:08.999000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:08.999000 audit[3866]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=3213 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:09.019581 kernel: audit: type=1400 audit(1752279968.999:1012): avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:09.019787 kernel: audit: type=1300 audit(1752279968.999:1012): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=3213 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:08.999000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365376630303063623566643366633664633938373866616463323965 Jul 12 00:26:09.030640 kernel: audit: type=1327 audit(1752279968.999:1012): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365376630303063623566643366633664633938373866616463323965 Jul 12 00:26:09.000000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:09.038707 kernel: audit: type=1400 audit(1752279969.000:1013): avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:09.000000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:09.048501 kernel: audit: type=1400 audit(1752279969.000:1013): avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:09.000000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:09.056853 kernel: audit: type=1400 audit(1752279969.000:1013): avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:09.000000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:09.065481 kernel: audit: type=1400 audit(1752279969.000:1013): avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:09.000000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:09.074432 kernel: audit: type=1400 audit(1752279969.000:1013): avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:09.000000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:09.082478 kernel: audit: type=1400 audit(1752279969.000:1013): avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:09.000000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:09.094184 kernel: audit: type=1400 audit(1752279969.000:1013): avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:09.000000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:09.000000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:09.000000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:09.000000 audit: BPF prog-id=139 op=LOAD Jul 12 00:26:09.000000 audit[3866]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=3213 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:09.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365376630303063623566643366633664633938373866616463323965 Jul 12 00:26:09.008000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:09.008000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:09.008000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:09.008000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:09.008000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:09.008000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:09.008000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:09.008000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:09.008000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:09.008000 audit: BPF prog-id=140 op=LOAD Jul 12 00:26:09.008000 audit[3866]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=3213 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:09.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365376630303063623566643366633664633938373866616463323965 Jul 12 00:26:09.019000 audit: BPF prog-id=140 op=UNLOAD Jul 12 00:26:09.019000 audit: BPF prog-id=139 op=UNLOAD Jul 12 00:26:09.019000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:09.019000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:09.019000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:09.019000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:09.019000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:09.019000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:09.019000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:09.019000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:09.019000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:09.019000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:09.019000 audit: BPF prog-id=141 op=LOAD Jul 12 00:26:09.019000 audit[3866]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=3213 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:09.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365376630303063623566643366633664633938373866616463323965 Jul 12 00:26:09.103286 env[1733]: time="2025-07-12T00:26:09.103222055Z" level=info msg="StartContainer for \"ce7f000cb5fd3fc6dc9878fadc29e9c96c86d05c2e400f262d530a55f62cf03b\" returns successfully" Jul 12 00:26:09.372538 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Jul 12 00:26:09.372753 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Jul 12 00:26:09.678990 kubelet[2742]: I0712 00:26:09.678906 2742 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-xsm2r" podStartSLOduration=2.451362558 podStartE2EDuration="21.678880529s" podCreationTimestamp="2025-07-12 00:25:48 +0000 UTC" firstStartedPulling="2025-07-12 00:25:49.604094774 +0000 UTC m=+30.748074016" lastFinishedPulling="2025-07-12 00:26:08.831612745 +0000 UTC m=+49.975591987" observedRunningTime="2025-07-12 00:26:09.623129421 +0000 UTC m=+50.767108687" watchObservedRunningTime="2025-07-12 00:26:09.678880529 +0000 UTC m=+50.822859783" Jul 12 00:26:09.689113 env[1733]: time="2025-07-12T00:26:09.689055252Z" level=info msg="StopPodSandbox for \"25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a\"" Jul 12 00:26:10.437429 env[1733]: 2025-07-12 00:26:10.298 [INFO][3932] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a" Jul 12 00:26:10.437429 env[1733]: 2025-07-12 00:26:10.298 [INFO][3932] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a" iface="eth0" netns="/var/run/netns/cni-f710b56c-c47f-2a1d-6904-3ace9b9f0c72" Jul 12 00:26:10.437429 env[1733]: 2025-07-12 00:26:10.299 [INFO][3932] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a" iface="eth0" netns="/var/run/netns/cni-f710b56c-c47f-2a1d-6904-3ace9b9f0c72" Jul 12 00:26:10.437429 env[1733]: 2025-07-12 00:26:10.309 [INFO][3932] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a" iface="eth0" netns="/var/run/netns/cni-f710b56c-c47f-2a1d-6904-3ace9b9f0c72" Jul 12 00:26:10.437429 env[1733]: 2025-07-12 00:26:10.309 [INFO][3932] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a" Jul 12 00:26:10.437429 env[1733]: 2025-07-12 00:26:10.309 [INFO][3932] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a" Jul 12 00:26:10.437429 env[1733]: 2025-07-12 00:26:10.402 [INFO][3949] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a" HandleID="k8s-pod-network.25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a" Workload="ip--172--31--26--167-k8s-whisker--694fcf6c96--9tks2-eth0" Jul 12 00:26:10.437429 env[1733]: 2025-07-12 00:26:10.403 [INFO][3949] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 12 00:26:10.437429 env[1733]: 2025-07-12 00:26:10.403 [INFO][3949] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 12 00:26:10.437429 env[1733]: 2025-07-12 00:26:10.424 [WARNING][3949] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a" HandleID="k8s-pod-network.25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a" Workload="ip--172--31--26--167-k8s-whisker--694fcf6c96--9tks2-eth0" Jul 12 00:26:10.437429 env[1733]: 2025-07-12 00:26:10.424 [INFO][3949] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a" HandleID="k8s-pod-network.25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a" Workload="ip--172--31--26--167-k8s-whisker--694fcf6c96--9tks2-eth0" Jul 12 00:26:10.437429 env[1733]: 2025-07-12 00:26:10.426 [INFO][3949] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 12 00:26:10.437429 env[1733]: 2025-07-12 00:26:10.432 [INFO][3932] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a" Jul 12 00:26:10.443617 systemd[1]: run-netns-cni\x2df710b56c\x2dc47f\x2d2a1d\x2d6904\x2d3ace9b9f0c72.mount: Deactivated successfully. Jul 12 00:26:10.444776 env[1733]: time="2025-07-12T00:26:10.444715898Z" level=info msg="TearDown network for sandbox \"25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a\" successfully" Jul 12 00:26:10.445557 env[1733]: time="2025-07-12T00:26:10.445498334Z" level=info msg="StopPodSandbox for \"25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a\" returns successfully" Jul 12 00:26:10.608125 kubelet[2742]: I0712 00:26:10.607489 2742 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"kube-api-access-xtfwk\" (UniqueName: \"kubernetes.io/projected/d10fda65-1669-431d-92ec-3a2ad1e452f9-kube-api-access-xtfwk\") pod \"d10fda65-1669-431d-92ec-3a2ad1e452f9\" (UID: \"d10fda65-1669-431d-92ec-3a2ad1e452f9\") " Jul 12 00:26:10.608125 kubelet[2742]: I0712 00:26:10.607589 2742 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d10fda65-1669-431d-92ec-3a2ad1e452f9-whisker-ca-bundle\") pod \"d10fda65-1669-431d-92ec-3a2ad1e452f9\" (UID: \"d10fda65-1669-431d-92ec-3a2ad1e452f9\") " Jul 12 00:26:10.608125 kubelet[2742]: I0712 00:26:10.607669 2742 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/d10fda65-1669-431d-92ec-3a2ad1e452f9-whisker-backend-key-pair\") pod \"d10fda65-1669-431d-92ec-3a2ad1e452f9\" (UID: \"d10fda65-1669-431d-92ec-3a2ad1e452f9\") " Jul 12 00:26:10.621822 kubelet[2742]: I0712 00:26:10.621761 2742 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/d10fda65-1669-431d-92ec-3a2ad1e452f9-whisker-ca-bundle" (OuterVolumeSpecName: "whisker-ca-bundle") pod "d10fda65-1669-431d-92ec-3a2ad1e452f9" (UID: "d10fda65-1669-431d-92ec-3a2ad1e452f9"). InnerVolumeSpecName "whisker-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Jul 12 00:26:10.643565 kubelet[2742]: I0712 00:26:10.630384 2742 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/d10fda65-1669-431d-92ec-3a2ad1e452f9-whisker-backend-key-pair" (OuterVolumeSpecName: "whisker-backend-key-pair") pod "d10fda65-1669-431d-92ec-3a2ad1e452f9" (UID: "d10fda65-1669-431d-92ec-3a2ad1e452f9"). InnerVolumeSpecName "whisker-backend-key-pair". PluginName "kubernetes.io/secret", VolumeGidValue "" Jul 12 00:26:10.635829 systemd[1]: var-lib-kubelet-pods-d10fda65\x2d1669\x2d431d\x2d92ec\x2d3a2ad1e452f9-volumes-kubernetes.io\x7esecret-whisker\x2dbackend\x2dkey\x2dpair.mount: Deactivated successfully. Jul 12 00:26:10.645228 kubelet[2742]: I0712 00:26:10.645156 2742 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/d10fda65-1669-431d-92ec-3a2ad1e452f9-kube-api-access-xtfwk" (OuterVolumeSpecName: "kube-api-access-xtfwk") pod "d10fda65-1669-431d-92ec-3a2ad1e452f9" (UID: "d10fda65-1669-431d-92ec-3a2ad1e452f9"). InnerVolumeSpecName "kube-api-access-xtfwk". PluginName "kubernetes.io/projected", VolumeGidValue "" Jul 12 00:26:10.648416 systemd[1]: var-lib-kubelet-pods-d10fda65\x2d1669\x2d431d\x2d92ec\x2d3a2ad1e452f9-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dxtfwk.mount: Deactivated successfully. Jul 12 00:26:10.709798 kubelet[2742]: I0712 00:26:10.708744 2742 reconciler_common.go:293] "Volume detached for volume \"kube-api-access-xtfwk\" (UniqueName: \"kubernetes.io/projected/d10fda65-1669-431d-92ec-3a2ad1e452f9-kube-api-access-xtfwk\") on node \"ip-172-31-26-167\" DevicePath \"\"" Jul 12 00:26:10.709798 kubelet[2742]: I0712 00:26:10.708801 2742 reconciler_common.go:293] "Volume detached for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d10fda65-1669-431d-92ec-3a2ad1e452f9-whisker-ca-bundle\") on node \"ip-172-31-26-167\" DevicePath \"\"" Jul 12 00:26:10.709798 kubelet[2742]: I0712 00:26:10.708827 2742 reconciler_common.go:293] "Volume detached for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/d10fda65-1669-431d-92ec-3a2ad1e452f9-whisker-backend-key-pair\") on node \"ip-172-31-26-167\" DevicePath \"\"" Jul 12 00:26:10.807626 systemd[1]: Removed slice kubepods-besteffort-podd10fda65_1669_431d_92ec_3a2ad1e452f9.slice. Jul 12 00:26:10.903619 systemd[1]: Created slice kubepods-besteffort-podbee93b13_3af1_4c27_8ff4_c11f72a4622e.slice. Jul 12 00:26:11.011361 kubelet[2742]: I0712 00:26:11.011207 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/bee93b13-3af1-4c27-8ff4-c11f72a4622e-whisker-ca-bundle\") pod \"whisker-7bfc744f4d-xbqj5\" (UID: \"bee93b13-3af1-4c27-8ff4-c11f72a4622e\") " pod="calico-system/whisker-7bfc744f4d-xbqj5" Jul 12 00:26:11.011665 kubelet[2742]: I0712 00:26:11.011635 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4gvgj\" (UniqueName: \"kubernetes.io/projected/bee93b13-3af1-4c27-8ff4-c11f72a4622e-kube-api-access-4gvgj\") pod \"whisker-7bfc744f4d-xbqj5\" (UID: \"bee93b13-3af1-4c27-8ff4-c11f72a4622e\") " pod="calico-system/whisker-7bfc744f4d-xbqj5" Jul 12 00:26:11.011966 kubelet[2742]: I0712 00:26:11.011936 2742 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/bee93b13-3af1-4c27-8ff4-c11f72a4622e-whisker-backend-key-pair\") pod \"whisker-7bfc744f4d-xbqj5\" (UID: \"bee93b13-3af1-4c27-8ff4-c11f72a4622e\") " pod="calico-system/whisker-7bfc744f4d-xbqj5" Jul 12 00:26:11.179701 kubelet[2742]: I0712 00:26:11.179615 2742 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="d10fda65-1669-431d-92ec-3a2ad1e452f9" path="/var/lib/kubelet/pods/d10fda65-1669-431d-92ec-3a2ad1e452f9/volumes" Jul 12 00:26:11.211964 env[1733]: time="2025-07-12T00:26:11.211880987Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-7bfc744f4d-xbqj5,Uid:bee93b13-3af1-4c27-8ff4-c11f72a4622e,Namespace:calico-system,Attempt:0,}" Jul 12 00:26:11.454574 systemd-networkd[1459]: calic02a81ce259: Link UP Jul 12 00:26:11.460996 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 12 00:26:11.461156 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic02a81ce259: link becomes ready Jul 12 00:26:11.462000 systemd-networkd[1459]: calic02a81ce259: Gained carrier Jul 12 00:26:11.474117 (udev-worker)[4028]: Network interface NamePolicy= disabled on kernel command line. Jul 12 00:26:11.498191 env[1733]: 2025-07-12 00:26:11.293 [INFO][3993] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Jul 12 00:26:11.498191 env[1733]: 2025-07-12 00:26:11.318 [INFO][3993] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--26--167-k8s-whisker--7bfc744f4d--xbqj5-eth0 whisker-7bfc744f4d- calico-system bee93b13-3af1-4c27-8ff4-c11f72a4622e 903 0 2025-07-12 00:26:10 +0000 UTC map[app.kubernetes.io/name:whisker k8s-app:whisker pod-template-hash:7bfc744f4d projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:whisker] map[] [] [] []} {k8s ip-172-31-26-167 whisker-7bfc744f4d-xbqj5 eth0 whisker [] [] [kns.calico-system ksa.calico-system.whisker] calic02a81ce259 [] [] }} ContainerID="f46a5340ea79b455bd77b3faaac4890c99870f93fac42616e3714bd8d77168fb" Namespace="calico-system" Pod="whisker-7bfc744f4d-xbqj5" WorkloadEndpoint="ip--172--31--26--167-k8s-whisker--7bfc744f4d--xbqj5-" Jul 12 00:26:11.498191 env[1733]: 2025-07-12 00:26:11.318 [INFO][3993] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="f46a5340ea79b455bd77b3faaac4890c99870f93fac42616e3714bd8d77168fb" Namespace="calico-system" Pod="whisker-7bfc744f4d-xbqj5" WorkloadEndpoint="ip--172--31--26--167-k8s-whisker--7bfc744f4d--xbqj5-eth0" Jul 12 00:26:11.498191 env[1733]: 2025-07-12 00:26:11.368 [INFO][4005] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f46a5340ea79b455bd77b3faaac4890c99870f93fac42616e3714bd8d77168fb" HandleID="k8s-pod-network.f46a5340ea79b455bd77b3faaac4890c99870f93fac42616e3714bd8d77168fb" Workload="ip--172--31--26--167-k8s-whisker--7bfc744f4d--xbqj5-eth0" Jul 12 00:26:11.498191 env[1733]: 2025-07-12 00:26:11.374 [INFO][4005] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f46a5340ea79b455bd77b3faaac4890c99870f93fac42616e3714bd8d77168fb" HandleID="k8s-pod-network.f46a5340ea79b455bd77b3faaac4890c99870f93fac42616e3714bd8d77168fb" Workload="ip--172--31--26--167-k8s-whisker--7bfc744f4d--xbqj5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400024b0d0), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-26-167", "pod":"whisker-7bfc744f4d-xbqj5", "timestamp":"2025-07-12 00:26:11.368157909 +0000 UTC"}, Hostname:"ip-172-31-26-167", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 12 00:26:11.498191 env[1733]: 2025-07-12 00:26:11.374 [INFO][4005] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 12 00:26:11.498191 env[1733]: 2025-07-12 00:26:11.374 [INFO][4005] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 12 00:26:11.498191 env[1733]: 2025-07-12 00:26:11.374 [INFO][4005] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-26-167' Jul 12 00:26:11.498191 env[1733]: 2025-07-12 00:26:11.389 [INFO][4005] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.f46a5340ea79b455bd77b3faaac4890c99870f93fac42616e3714bd8d77168fb" host="ip-172-31-26-167" Jul 12 00:26:11.498191 env[1733]: 2025-07-12 00:26:11.396 [INFO][4005] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-26-167" Jul 12 00:26:11.498191 env[1733]: 2025-07-12 00:26:11.403 [INFO][4005] ipam/ipam.go 511: Trying affinity for 192.168.69.192/26 host="ip-172-31-26-167" Jul 12 00:26:11.498191 env[1733]: 2025-07-12 00:26:11.407 [INFO][4005] ipam/ipam.go 158: Attempting to load block cidr=192.168.69.192/26 host="ip-172-31-26-167" Jul 12 00:26:11.498191 env[1733]: 2025-07-12 00:26:11.410 [INFO][4005] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.69.192/26 host="ip-172-31-26-167" Jul 12 00:26:11.498191 env[1733]: 2025-07-12 00:26:11.410 [INFO][4005] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.69.192/26 handle="k8s-pod-network.f46a5340ea79b455bd77b3faaac4890c99870f93fac42616e3714bd8d77168fb" host="ip-172-31-26-167" Jul 12 00:26:11.498191 env[1733]: 2025-07-12 00:26:11.418 [INFO][4005] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.f46a5340ea79b455bd77b3faaac4890c99870f93fac42616e3714bd8d77168fb Jul 12 00:26:11.498191 env[1733]: 2025-07-12 00:26:11.425 [INFO][4005] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.69.192/26 handle="k8s-pod-network.f46a5340ea79b455bd77b3faaac4890c99870f93fac42616e3714bd8d77168fb" host="ip-172-31-26-167" Jul 12 00:26:11.498191 env[1733]: 2025-07-12 00:26:11.435 [INFO][4005] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.69.193/26] block=192.168.69.192/26 handle="k8s-pod-network.f46a5340ea79b455bd77b3faaac4890c99870f93fac42616e3714bd8d77168fb" host="ip-172-31-26-167" Jul 12 00:26:11.498191 env[1733]: 2025-07-12 00:26:11.435 [INFO][4005] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.69.193/26] handle="k8s-pod-network.f46a5340ea79b455bd77b3faaac4890c99870f93fac42616e3714bd8d77168fb" host="ip-172-31-26-167" Jul 12 00:26:11.498191 env[1733]: 2025-07-12 00:26:11.435 [INFO][4005] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 12 00:26:11.498191 env[1733]: 2025-07-12 00:26:11.435 [INFO][4005] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.69.193/26] IPv6=[] ContainerID="f46a5340ea79b455bd77b3faaac4890c99870f93fac42616e3714bd8d77168fb" HandleID="k8s-pod-network.f46a5340ea79b455bd77b3faaac4890c99870f93fac42616e3714bd8d77168fb" Workload="ip--172--31--26--167-k8s-whisker--7bfc744f4d--xbqj5-eth0" Jul 12 00:26:11.500055 env[1733]: 2025-07-12 00:26:11.439 [INFO][3993] cni-plugin/k8s.go 418: Populated endpoint ContainerID="f46a5340ea79b455bd77b3faaac4890c99870f93fac42616e3714bd8d77168fb" Namespace="calico-system" Pod="whisker-7bfc744f4d-xbqj5" WorkloadEndpoint="ip--172--31--26--167-k8s-whisker--7bfc744f4d--xbqj5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--167-k8s-whisker--7bfc744f4d--xbqj5-eth0", GenerateName:"whisker-7bfc744f4d-", Namespace:"calico-system", SelfLink:"", UID:"bee93b13-3af1-4c27-8ff4-c11f72a4622e", ResourceVersion:"903", Generation:0, CreationTimestamp:time.Date(2025, time.July, 12, 0, 26, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"7bfc744f4d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-167", ContainerID:"", Pod:"whisker-7bfc744f4d-xbqj5", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.69.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"calic02a81ce259", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 12 00:26:11.500055 env[1733]: 2025-07-12 00:26:11.439 [INFO][3993] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.69.193/32] ContainerID="f46a5340ea79b455bd77b3faaac4890c99870f93fac42616e3714bd8d77168fb" Namespace="calico-system" Pod="whisker-7bfc744f4d-xbqj5" WorkloadEndpoint="ip--172--31--26--167-k8s-whisker--7bfc744f4d--xbqj5-eth0" Jul 12 00:26:11.500055 env[1733]: 2025-07-12 00:26:11.439 [INFO][3993] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic02a81ce259 ContainerID="f46a5340ea79b455bd77b3faaac4890c99870f93fac42616e3714bd8d77168fb" Namespace="calico-system" Pod="whisker-7bfc744f4d-xbqj5" WorkloadEndpoint="ip--172--31--26--167-k8s-whisker--7bfc744f4d--xbqj5-eth0" Jul 12 00:26:11.500055 env[1733]: 2025-07-12 00:26:11.462 [INFO][3993] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f46a5340ea79b455bd77b3faaac4890c99870f93fac42616e3714bd8d77168fb" Namespace="calico-system" Pod="whisker-7bfc744f4d-xbqj5" WorkloadEndpoint="ip--172--31--26--167-k8s-whisker--7bfc744f4d--xbqj5-eth0" Jul 12 00:26:11.500055 env[1733]: 2025-07-12 00:26:11.463 [INFO][3993] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="f46a5340ea79b455bd77b3faaac4890c99870f93fac42616e3714bd8d77168fb" Namespace="calico-system" Pod="whisker-7bfc744f4d-xbqj5" WorkloadEndpoint="ip--172--31--26--167-k8s-whisker--7bfc744f4d--xbqj5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--167-k8s-whisker--7bfc744f4d--xbqj5-eth0", GenerateName:"whisker-7bfc744f4d-", Namespace:"calico-system", SelfLink:"", UID:"bee93b13-3af1-4c27-8ff4-c11f72a4622e", ResourceVersion:"903", Generation:0, CreationTimestamp:time.Date(2025, time.July, 12, 0, 26, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"7bfc744f4d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-167", ContainerID:"f46a5340ea79b455bd77b3faaac4890c99870f93fac42616e3714bd8d77168fb", Pod:"whisker-7bfc744f4d-xbqj5", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.69.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"calic02a81ce259", MAC:"6e:9b:0c:a8:7e:68", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 12 00:26:11.500055 env[1733]: 2025-07-12 00:26:11.490 [INFO][3993] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="f46a5340ea79b455bd77b3faaac4890c99870f93fac42616e3714bd8d77168fb" Namespace="calico-system" Pod="whisker-7bfc744f4d-xbqj5" WorkloadEndpoint="ip--172--31--26--167-k8s-whisker--7bfc744f4d--xbqj5-eth0" Jul 12 00:26:11.594359 env[1733]: time="2025-07-12T00:26:11.594224466Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 12 00:26:11.594894 env[1733]: time="2025-07-12T00:26:11.594813442Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 12 00:26:11.595103 env[1733]: time="2025-07-12T00:26:11.595040407Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 12 00:26:11.596255 env[1733]: time="2025-07-12T00:26:11.596125241Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f46a5340ea79b455bd77b3faaac4890c99870f93fac42616e3714bd8d77168fb pid=4075 runtime=io.containerd.runc.v2 Jul 12 00:26:11.655181 systemd[1]: Started cri-containerd-f46a5340ea79b455bd77b3faaac4890c99870f93fac42616e3714bd8d77168fb.scope. Jul 12 00:26:11.669000 audit[4119]: AVC avc: denied { write } for pid=4119 comm="tee" name="fd" dev="proc" ino=22609 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 12 00:26:11.680000 audit[4065]: AVC avc: denied { write } for pid=4065 comm="tee" name="fd" dev="proc" ino=21864 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 12 00:26:11.669000 audit[4119]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd5a5d7df a2=241 a3=1b6 items=1 ppid=4020 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:11.669000 audit: CWD cwd="/etc/service/enabled/felix/log" Jul 12 00:26:11.669000 audit: PATH item=0 name="/dev/fd/63" inode=21858 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 12 00:26:11.669000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 12 00:26:11.680000 audit[4065]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffee6327cf a2=241 a3=1b6 items=1 ppid=4017 pid=4065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:11.680000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Jul 12 00:26:11.680000 audit: PATH item=0 name="/dev/fd/63" inode=21498 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 12 00:26:11.680000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 12 00:26:11.754000 audit[4130]: AVC avc: denied { write } for pid=4130 comm="tee" name="fd" dev="proc" ino=21882 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 12 00:26:11.754000 audit[4130]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff7dbc7e0 a2=241 a3=1b6 items=1 ppid=4042 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:11.754000 audit: CWD cwd="/etc/service/enabled/bird/log" Jul 12 00:26:11.762000 audit[4140]: AVC avc: denied { write } for pid=4140 comm="tee" name="fd" dev="proc" ino=22638 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 12 00:26:11.754000 audit: PATH item=0 name="/dev/fd/63" inode=21859 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 12 00:26:11.754000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 12 00:26:11.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:11.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:11.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:11.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:11.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:11.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:11.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:11.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:11.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:11.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:11.769000 audit: BPF prog-id=142 op=LOAD Jul 12 00:26:11.775000 audit[4089]: AVC avc: denied { bpf } for pid=4089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:11.775000 audit[4089]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4075 pid=4089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:11.775000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634366135333430656137396234353562643737623366616161633438 Jul 12 00:26:11.776000 audit[4089]: AVC avc: denied { perfmon } for pid=4089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:11.776000 audit[4089]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4075 pid=4089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:11.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634366135333430656137396234353562643737623366616161633438 Jul 12 00:26:11.777000 audit[4089]: AVC avc: denied { bpf } for pid=4089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:11.777000 audit[4089]: AVC avc: denied { bpf } for pid=4089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:11.777000 audit[4089]: AVC avc: denied { bpf } for pid=4089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:11.777000 audit[4089]: AVC avc: denied { perfmon } for pid=4089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:11.777000 audit[4089]: AVC avc: denied { perfmon } for pid=4089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:11.777000 audit[4089]: AVC avc: denied { perfmon } for pid=4089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:11.777000 audit[4089]: AVC avc: denied { perfmon } for pid=4089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:11.777000 audit[4089]: AVC avc: denied { perfmon } for pid=4089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:11.777000 audit[4089]: AVC avc: denied { bpf } for pid=4089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:11.777000 audit[4089]: AVC avc: denied { bpf } for pid=4089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:11.777000 audit: BPF prog-id=143 op=LOAD Jul 12 00:26:11.777000 audit[4089]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4075 pid=4089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:11.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634366135333430656137396234353562643737623366616161633438 Jul 12 00:26:11.778000 audit[4089]: AVC avc: denied { bpf } for pid=4089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:11.778000 audit[4089]: AVC avc: denied { bpf } for pid=4089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:11.778000 audit[4089]: AVC avc: denied { perfmon } for pid=4089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:11.778000 audit[4089]: AVC avc: denied { perfmon } for pid=4089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:11.778000 audit[4089]: AVC avc: denied { perfmon } for pid=4089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:11.778000 audit[4089]: AVC avc: denied { perfmon } for pid=4089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:11.778000 audit[4089]: AVC avc: denied { perfmon } for pid=4089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:11.778000 audit[4089]: AVC avc: denied { bpf } for pid=4089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:11.778000 audit[4089]: AVC avc: denied { bpf } for pid=4089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:11.778000 audit: BPF prog-id=144 op=LOAD Jul 12 00:26:11.778000 audit[4089]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4075 pid=4089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:11.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634366135333430656137396234353562643737623366616161633438 Jul 12 00:26:11.779000 audit: BPF prog-id=144 op=UNLOAD Jul 12 00:26:11.779000 audit: BPF prog-id=143 op=UNLOAD Jul 12 00:26:11.780000 audit[4089]: AVC avc: denied { bpf } for pid=4089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:11.780000 audit[4089]: AVC avc: denied { bpf } for pid=4089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:11.780000 audit[4089]: AVC avc: denied { bpf } for pid=4089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:11.780000 audit[4089]: AVC avc: denied { perfmon } for pid=4089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:11.780000 audit[4089]: AVC avc: denied { perfmon } for pid=4089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:11.780000 audit[4089]: AVC avc: denied { perfmon } for pid=4089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:11.780000 audit[4089]: AVC avc: denied { perfmon } for pid=4089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:11.780000 audit[4089]: AVC avc: denied { perfmon } for pid=4089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:11.780000 audit[4089]: AVC avc: denied { bpf } for pid=4089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:11.780000 audit[4089]: AVC avc: denied { bpf } for pid=4089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:11.780000 audit: BPF prog-id=145 op=LOAD Jul 12 00:26:11.780000 audit[4089]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4075 pid=4089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:11.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634366135333430656137396234353562643737623366616161633438 Jul 12 00:26:11.762000 audit[4140]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff39a77d0 a2=241 a3=1b6 items=1 ppid=4034 pid=4140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:11.762000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Jul 12 00:26:11.762000 audit: PATH item=0 name="/dev/fd/63" inode=21874 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 12 00:26:11.762000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 12 00:26:11.877826 env[1733]: time="2025-07-12T00:26:11.877758808Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-7bfc744f4d-xbqj5,Uid:bee93b13-3af1-4c27-8ff4-c11f72a4622e,Namespace:calico-system,Attempt:0,} returns sandbox id \"f46a5340ea79b455bd77b3faaac4890c99870f93fac42616e3714bd8d77168fb\"" Jul 12 00:26:11.888397 env[1733]: time="2025-07-12T00:26:11.888327360Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.2\"" Jul 12 00:26:11.890000 audit[4147]: AVC avc: denied { write } for pid=4147 comm="tee" name="fd" dev="proc" ino=22679 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 12 00:26:11.890000 audit[4147]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc76067e1 a2=241 a3=1b6 items=1 ppid=4023 pid=4147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:11.890000 audit: CWD cwd="/etc/service/enabled/cni/log" Jul 12 00:26:11.890000 audit: PATH item=0 name="/dev/fd/63" inode=21885 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 12 00:26:11.890000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 12 00:26:11.893000 audit[4145]: AVC avc: denied { write } for pid=4145 comm="tee" name="fd" dev="proc" ino=22683 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 12 00:26:11.893000 audit[4145]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe1b917df a2=241 a3=1b6 items=1 ppid=4033 pid=4145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:11.893000 audit: CWD cwd="/etc/service/enabled/bird6/log" Jul 12 00:26:11.893000 audit: PATH item=0 name="/dev/fd/63" inode=21884 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 12 00:26:11.893000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 12 00:26:11.902000 audit[4142]: AVC avc: denied { write } for pid=4142 comm="tee" name="fd" dev="proc" ino=22688 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 12 00:26:11.902000 audit[4142]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff70af7df a2=241 a3=1b6 items=1 ppid=4029 pid=4142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:11.902000 audit: CWD cwd="/etc/service/enabled/confd/log" Jul 12 00:26:11.902000 audit: PATH item=0 name="/dev/fd/63" inode=21875 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 12 00:26:11.902000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 12 00:26:12.124876 systemd[1]: run-containerd-runc-k8s.io-ce7f000cb5fd3fc6dc9878fadc29e9c96c86d05c2e400f262d530a55f62cf03b-runc.YpCzir.mount: Deactivated successfully. Jul 12 00:26:12.607000 audit[4203]: AVC avc: denied { bpf } for pid=4203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.607000 audit[4203]: AVC avc: denied { bpf } for pid=4203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.607000 audit[4203]: AVC avc: denied { perfmon } for pid=4203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.607000 audit[4203]: AVC avc: denied { perfmon } for pid=4203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.607000 audit[4203]: AVC avc: denied { perfmon } for pid=4203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.607000 audit[4203]: AVC avc: denied { perfmon } for pid=4203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.607000 audit[4203]: AVC avc: denied { perfmon } for pid=4203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.607000 audit[4203]: AVC avc: denied { bpf } for pid=4203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.607000 audit[4203]: AVC avc: denied { bpf } for pid=4203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.607000 audit: BPF prog-id=146 op=LOAD Jul 12 00:26:12.607000 audit[4203]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff64cafe8 a2=98 a3=fffff64cafd8 items=0 ppid=4021 pid=4203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:12.607000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 12 00:26:12.608000 audit: BPF prog-id=146 op=UNLOAD Jul 12 00:26:12.608000 audit[4203]: AVC avc: denied { bpf } for pid=4203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.608000 audit[4203]: AVC avc: denied { bpf } for pid=4203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.608000 audit[4203]: AVC avc: denied { perfmon } for pid=4203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.608000 audit[4203]: AVC avc: denied { perfmon } for pid=4203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.608000 audit[4203]: AVC avc: denied { perfmon } for pid=4203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.608000 audit[4203]: AVC avc: denied { perfmon } for pid=4203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.608000 audit[4203]: AVC avc: denied { perfmon } for pid=4203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.608000 audit[4203]: AVC avc: denied { bpf } for pid=4203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.608000 audit[4203]: AVC avc: denied { bpf } for pid=4203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.608000 audit: BPF prog-id=147 op=LOAD Jul 12 00:26:12.608000 audit[4203]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff64cae98 a2=74 a3=95 items=0 ppid=4021 pid=4203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:12.608000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 12 00:26:12.608000 audit: BPF prog-id=147 op=UNLOAD Jul 12 00:26:12.608000 audit[4203]: AVC avc: denied { bpf } for pid=4203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.608000 audit[4203]: AVC avc: denied { bpf } for pid=4203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.608000 audit[4203]: AVC avc: denied { perfmon } for pid=4203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.608000 audit[4203]: AVC avc: denied { perfmon } for pid=4203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.608000 audit[4203]: AVC avc: denied { perfmon } for pid=4203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.608000 audit[4203]: AVC avc: denied { perfmon } for pid=4203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.608000 audit[4203]: AVC avc: denied { perfmon } for pid=4203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.608000 audit[4203]: AVC avc: denied { bpf } for pid=4203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.608000 audit[4203]: AVC avc: denied { bpf } for pid=4203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.608000 audit: BPF prog-id=148 op=LOAD Jul 12 00:26:12.608000 audit[4203]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff64caec8 a2=40 a3=fffff64caef8 items=0 ppid=4021 pid=4203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:12.608000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 12 00:26:12.608000 audit: BPF prog-id=148 op=UNLOAD Jul 12 00:26:12.608000 audit[4203]: AVC avc: denied { perfmon } for pid=4203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.608000 audit[4203]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=fffff64cafe0 a2=50 a3=0 items=0 ppid=4021 pid=4203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:12.608000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 12 00:26:12.612000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.612000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.612000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.612000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.612000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.612000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.612000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.612000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.612000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.612000 audit: BPF prog-id=149 op=LOAD Jul 12 00:26:12.612000 audit[4204]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdc5ae308 a2=98 a3=ffffdc5ae2f8 items=0 ppid=4021 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:12.612000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 12 00:26:12.614000 audit: BPF prog-id=149 op=UNLOAD Jul 12 00:26:12.614000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.614000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.614000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.614000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.614000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.614000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.614000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.614000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.614000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.614000 audit: BPF prog-id=150 op=LOAD Jul 12 00:26:12.614000 audit[4204]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffdc5adf98 a2=74 a3=95 items=0 ppid=4021 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:12.614000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 12 00:26:12.615000 audit: BPF prog-id=150 op=UNLOAD Jul 12 00:26:12.616000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.616000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.616000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.616000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.616000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.616000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.616000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.616000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.616000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.616000 audit: BPF prog-id=151 op=LOAD Jul 12 00:26:12.616000 audit[4204]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffdc5adff8 a2=94 a3=2 items=0 ppid=4021 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:12.616000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 12 00:26:12.617000 audit: BPF prog-id=151 op=UNLOAD Jul 12 00:26:12.751376 systemd-networkd[1459]: calic02a81ce259: Gained IPv6LL Jul 12 00:26:12.804000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.804000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.804000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.804000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.804000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.804000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.804000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.804000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.804000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.804000 audit: BPF prog-id=152 op=LOAD Jul 12 00:26:12.804000 audit[4204]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffdc5adfb8 a2=40 a3=ffffdc5adfe8 items=0 ppid=4021 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:12.804000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 12 00:26:12.804000 audit: BPF prog-id=152 op=UNLOAD Jul 12 00:26:12.804000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.804000 audit[4204]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffdc5ae0d0 a2=50 a3=0 items=0 ppid=4021 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:12.804000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 12 00:26:12.820000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.820000 audit[4204]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdc5ae028 a2=28 a3=ffffdc5ae158 items=0 ppid=4021 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:12.820000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 12 00:26:12.821000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.821000 audit[4204]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdc5ae058 a2=28 a3=ffffdc5ae188 items=0 ppid=4021 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:12.821000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 12 00:26:12.821000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.821000 audit[4204]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdc5adf08 a2=28 a3=ffffdc5ae038 items=0 ppid=4021 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:12.821000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 12 00:26:12.821000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.821000 audit[4204]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdc5ae078 a2=28 a3=ffffdc5ae1a8 items=0 ppid=4021 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:12.821000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 12 00:26:12.821000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.821000 audit[4204]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdc5ae058 a2=28 a3=ffffdc5ae188 items=0 ppid=4021 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:12.821000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 12 00:26:12.821000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.821000 audit[4204]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdc5ae048 a2=28 a3=ffffdc5ae178 items=0 ppid=4021 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:12.821000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 12 00:26:12.821000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.821000 audit[4204]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdc5ae078 a2=28 a3=ffffdc5ae1a8 items=0 ppid=4021 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:12.821000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 12 00:26:12.821000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.821000 audit[4204]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdc5ae058 a2=28 a3=ffffdc5ae188 items=0 ppid=4021 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:12.821000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 12 00:26:12.821000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.821000 audit[4204]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdc5ae078 a2=28 a3=ffffdc5ae1a8 items=0 ppid=4021 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:12.821000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 12 00:26:12.821000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.821000 audit[4204]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdc5ae048 a2=28 a3=ffffdc5ae178 items=0 ppid=4021 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:12.821000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 12 00:26:12.821000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.821000 audit[4204]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdc5ae0c8 a2=28 a3=ffffdc5ae208 items=0 ppid=4021 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:12.821000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 12 00:26:12.822000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.822000 audit[4204]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffdc5ade00 a2=50 a3=0 items=0 ppid=4021 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:12.822000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 12 00:26:12.822000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.822000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.822000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.822000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.822000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.822000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.822000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.822000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.822000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.822000 audit: BPF prog-id=153 op=LOAD Jul 12 00:26:12.822000 audit[4204]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffdc5ade08 a2=94 a3=5 items=0 ppid=4021 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:12.822000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 12 00:26:12.822000 audit: BPF prog-id=153 op=UNLOAD Jul 12 00:26:12.822000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.822000 audit[4204]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffdc5adf10 a2=50 a3=0 items=0 ppid=4021 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:12.822000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 12 00:26:12.822000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.822000 audit[4204]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffdc5ae058 a2=4 a3=3 items=0 ppid=4021 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:12.822000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 12 00:26:12.822000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.822000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.822000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.822000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.822000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.822000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.822000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.822000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.822000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.822000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.822000 audit[4204]: AVC avc: denied { confidentiality } for pid=4204 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:26:12.822000 audit[4204]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffdc5ae038 a2=94 a3=6 items=0 ppid=4021 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:12.822000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 12 00:26:12.823000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.823000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.823000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.823000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.823000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.823000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.823000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.823000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.823000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.823000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.823000 audit[4204]: AVC avc: denied { confidentiality } for pid=4204 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:26:12.823000 audit[4204]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffdc5ad808 a2=94 a3=83 items=0 ppid=4021 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:12.823000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 12 00:26:12.823000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.823000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.823000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.823000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.823000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.823000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.823000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.823000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.823000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.823000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.823000 audit[4204]: AVC avc: denied { confidentiality } for pid=4204 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:26:12.823000 audit[4204]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffdc5ad808 a2=94 a3=83 items=0 ppid=4021 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:12.823000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 12 00:26:12.844000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.844000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.844000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.844000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.844000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.844000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.844000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.844000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.844000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.844000 audit: BPF prog-id=154 op=LOAD Jul 12 00:26:12.844000 audit[4209]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc98b1fc8 a2=98 a3=ffffc98b1fb8 items=0 ppid=4021 pid=4209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:12.844000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Jul 12 00:26:12.846000 audit: BPF prog-id=154 op=UNLOAD Jul 12 00:26:12.846000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.846000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.846000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.846000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.846000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.846000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.846000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.846000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.846000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.846000 audit: BPF prog-id=155 op=LOAD Jul 12 00:26:12.846000 audit[4209]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc98b1e78 a2=74 a3=95 items=0 ppid=4021 pid=4209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:12.846000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Jul 12 00:26:12.847000 audit: BPF prog-id=155 op=UNLOAD Jul 12 00:26:12.847000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.847000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.847000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.847000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.847000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.847000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.847000 audit[4209]: AVC avc: denied { perfmon } for pid=4209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.847000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.847000 audit[4209]: AVC avc: denied { bpf } for pid=4209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:12.847000 audit: BPF prog-id=156 op=LOAD Jul 12 00:26:12.847000 audit[4209]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc98b1ea8 a2=40 a3=ffffc98b1ed8 items=0 ppid=4021 pid=4209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:12.847000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Jul 12 00:26:12.849000 audit: BPF prog-id=156 op=UNLOAD Jul 12 00:26:12.977559 (udev-worker)[3898]: Network interface NamePolicy= disabled on kernel command line. Jul 12 00:26:12.989855 systemd-networkd[1459]: vxlan.calico: Link UP Jul 12 00:26:12.989868 systemd-networkd[1459]: vxlan.calico: Gained carrier Jul 12 00:26:13.040000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.040000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.040000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.040000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.040000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.040000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.040000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.040000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.040000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.040000 audit: BPF prog-id=157 op=LOAD Jul 12 00:26:13.040000 audit[4234]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd1e8b9d8 a2=98 a3=ffffd1e8b9c8 items=0 ppid=4021 pid=4234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.040000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 12 00:26:13.041000 audit: BPF prog-id=157 op=UNLOAD Jul 12 00:26:13.042000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.042000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.042000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.042000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.042000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.042000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.042000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.042000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.042000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.042000 audit: BPF prog-id=158 op=LOAD Jul 12 00:26:13.042000 audit[4234]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd1e8b6b8 a2=74 a3=95 items=0 ppid=4021 pid=4234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.042000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 12 00:26:13.043000 audit: BPF prog-id=158 op=UNLOAD Jul 12 00:26:13.044000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.044000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.044000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.044000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.044000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.044000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.044000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.044000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.044000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.044000 audit: BPF prog-id=159 op=LOAD Jul 12 00:26:13.044000 audit[4234]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd1e8b718 a2=94 a3=2 items=0 ppid=4021 pid=4234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.044000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 12 00:26:13.046000 audit: BPF prog-id=159 op=UNLOAD Jul 12 00:26:13.046000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.046000 audit[4234]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffd1e8b748 a2=28 a3=ffffd1e8b878 items=0 ppid=4021 pid=4234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.046000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 12 00:26:13.047000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.047000 audit[4234]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd1e8b778 a2=28 a3=ffffd1e8b8a8 items=0 ppid=4021 pid=4234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.047000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 12 00:26:13.047000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.047000 audit[4234]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd1e8b628 a2=28 a3=ffffd1e8b758 items=0 ppid=4021 pid=4234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.047000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 12 00:26:13.048000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.048000 audit[4234]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffd1e8b798 a2=28 a3=ffffd1e8b8c8 items=0 ppid=4021 pid=4234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.048000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 12 00:26:13.048000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.048000 audit[4234]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffd1e8b778 a2=28 a3=ffffd1e8b8a8 items=0 ppid=4021 pid=4234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.048000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 12 00:26:13.049000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.049000 audit[4234]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffd1e8b768 a2=28 a3=ffffd1e8b898 items=0 ppid=4021 pid=4234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.049000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 12 00:26:13.049000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.049000 audit[4234]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffd1e8b798 a2=28 a3=ffffd1e8b8c8 items=0 ppid=4021 pid=4234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.049000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 12 00:26:13.050000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.050000 audit[4234]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd1e8b778 a2=28 a3=ffffd1e8b8a8 items=0 ppid=4021 pid=4234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.050000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 12 00:26:13.050000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.050000 audit[4234]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd1e8b798 a2=28 a3=ffffd1e8b8c8 items=0 ppid=4021 pid=4234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.050000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 12 00:26:13.050000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.050000 audit[4234]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd1e8b768 a2=28 a3=ffffd1e8b898 items=0 ppid=4021 pid=4234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.050000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 12 00:26:13.051000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.051000 audit[4234]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffd1e8b7e8 a2=28 a3=ffffd1e8b928 items=0 ppid=4021 pid=4234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.051000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 12 00:26:13.051000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.051000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.051000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.051000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.051000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.051000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.051000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.051000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.051000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.051000 audit: BPF prog-id=160 op=LOAD Jul 12 00:26:13.051000 audit[4234]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd1e8b608 a2=40 a3=ffffd1e8b638 items=0 ppid=4021 pid=4234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.051000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 12 00:26:13.053000 audit: BPF prog-id=160 op=UNLOAD Jul 12 00:26:13.054000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.054000 audit[4234]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffd1e8b630 a2=50 a3=0 items=0 ppid=4021 pid=4234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.054000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 12 00:26:13.055000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.055000 audit[4234]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffd1e8b630 a2=50 a3=0 items=0 ppid=4021 pid=4234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.055000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 12 00:26:13.056000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.056000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.056000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.056000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.056000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.056000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.056000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.056000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.056000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.056000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.056000 audit: BPF prog-id=161 op=LOAD Jul 12 00:26:13.056000 audit[4234]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd1e8ad98 a2=94 a3=2 items=0 ppid=4021 pid=4234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.056000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 12 00:26:13.058000 audit: BPF prog-id=161 op=UNLOAD Jul 12 00:26:13.058000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.058000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.058000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.058000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.058000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.058000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.058000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.058000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.058000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.058000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.058000 audit: BPF prog-id=162 op=LOAD Jul 12 00:26:13.058000 audit[4234]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd1e8af28 a2=94 a3=30 items=0 ppid=4021 pid=4234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.058000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 12 00:26:13.079000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.079000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.079000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.079000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.079000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.079000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.079000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.079000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.079000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.079000 audit: BPF prog-id=163 op=LOAD Jul 12 00:26:13.079000 audit[4239]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdc3e1ad8 a2=98 a3=ffffdc3e1ac8 items=0 ppid=4021 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.079000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:26:13.081000 audit: BPF prog-id=163 op=UNLOAD Jul 12 00:26:13.081000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.081000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.081000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.081000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.081000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.081000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.081000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.081000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.081000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.081000 audit: BPF prog-id=164 op=LOAD Jul 12 00:26:13.081000 audit[4239]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffdc3e1768 a2=74 a3=95 items=0 ppid=4021 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.081000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:26:13.084000 audit: BPF prog-id=164 op=UNLOAD Jul 12 00:26:13.084000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.084000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.084000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.084000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.084000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.084000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.084000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.084000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.084000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.084000 audit: BPF prog-id=165 op=LOAD Jul 12 00:26:13.084000 audit[4239]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffdc3e17c8 a2=94 a3=2 items=0 ppid=4021 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.084000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:26:13.085000 audit: BPF prog-id=165 op=UNLOAD Jul 12 00:26:13.182478 env[1733]: time="2025-07-12T00:26:13.182411981Z" level=info msg="StopPodSandbox for \"8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85\"" Jul 12 00:26:13.401000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.401000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.401000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.401000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.401000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.401000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.401000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.401000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.401000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.401000 audit: BPF prog-id=166 op=LOAD Jul 12 00:26:13.401000 audit[4239]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffdc3e1788 a2=40 a3=ffffdc3e17b8 items=0 ppid=4021 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.401000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:26:13.402000 audit: BPF prog-id=166 op=UNLOAD Jul 12 00:26:13.402000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.402000 audit[4239]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffdc3e18a0 a2=50 a3=0 items=0 ppid=4021 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.402000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:26:13.426000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.426000 audit[4239]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdc3e17f8 a2=28 a3=ffffdc3e1928 items=0 ppid=4021 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.426000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:26:13.427000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.427000 audit[4239]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdc3e1828 a2=28 a3=ffffdc3e1958 items=0 ppid=4021 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.427000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:26:13.429000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.429000 audit[4239]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdc3e16d8 a2=28 a3=ffffdc3e1808 items=0 ppid=4021 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.429000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:26:13.430000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.430000 audit[4239]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdc3e1848 a2=28 a3=ffffdc3e1978 items=0 ppid=4021 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.430000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:26:13.431000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.431000 audit[4239]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdc3e1828 a2=28 a3=ffffdc3e1958 items=0 ppid=4021 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.431000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:26:13.431000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.431000 audit[4239]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdc3e1818 a2=28 a3=ffffdc3e1948 items=0 ppid=4021 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.431000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:26:13.433000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.433000 audit[4239]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdc3e1848 a2=28 a3=ffffdc3e1978 items=0 ppid=4021 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.433000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:26:13.434000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.434000 audit[4239]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdc3e1828 a2=28 a3=ffffdc3e1958 items=0 ppid=4021 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.434000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:26:13.434000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.434000 audit[4239]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdc3e1848 a2=28 a3=ffffdc3e1978 items=0 ppid=4021 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.434000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:26:13.435000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.435000 audit[4239]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdc3e1818 a2=28 a3=ffffdc3e1948 items=0 ppid=4021 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.435000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:26:13.436000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.436000 audit[4239]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdc3e1898 a2=28 a3=ffffdc3e19d8 items=0 ppid=4021 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.436000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:26:13.439000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.439000 audit[4239]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffdc3e15d0 a2=50 a3=0 items=0 ppid=4021 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.439000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:26:13.441000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.441000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.441000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.441000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.441000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.441000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.441000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.441000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.441000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.441000 audit: BPF prog-id=167 op=LOAD Jul 12 00:26:13.441000 audit[4239]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffdc3e15d8 a2=94 a3=5 items=0 ppid=4021 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.441000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:26:13.441000 audit: BPF prog-id=167 op=UNLOAD Jul 12 00:26:13.441000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.441000 audit[4239]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffdc3e16e0 a2=50 a3=0 items=0 ppid=4021 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.441000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:26:13.441000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.441000 audit[4239]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffdc3e1828 a2=4 a3=3 items=0 ppid=4021 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.441000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:26:13.441000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.441000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.441000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.441000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.441000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.441000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.441000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.441000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.441000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.441000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.441000 audit[4239]: AVC avc: denied { confidentiality } for pid=4239 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:26:13.441000 audit[4239]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffdc3e1808 a2=94 a3=6 items=0 ppid=4021 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.441000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:26:13.442000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.442000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.442000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.442000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.442000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.442000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.442000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.442000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.442000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.442000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.442000 audit[4239]: AVC avc: denied { confidentiality } for pid=4239 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:26:13.442000 audit[4239]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffdc3e0fd8 a2=94 a3=83 items=0 ppid=4021 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.442000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:26:13.442000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.442000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.442000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.442000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.442000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.442000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.442000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.442000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.442000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.442000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.442000 audit[4239]: AVC avc: denied { confidentiality } for pid=4239 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 12 00:26:13.442000 audit[4239]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffdc3e0fd8 a2=94 a3=83 items=0 ppid=4021 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.442000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:26:13.443000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.443000 audit[4239]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffdc3e2a18 a2=10 a3=ffffdc3e2b08 items=0 ppid=4021 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.443000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:26:13.444000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.444000 audit[4239]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffdc3e28d8 a2=10 a3=ffffdc3e29c8 items=0 ppid=4021 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.444000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:26:13.444000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.444000 audit[4239]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffdc3e2848 a2=10 a3=ffffdc3e29c8 items=0 ppid=4021 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.444000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:26:13.444000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:13.444000 audit[4239]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffdc3e2848 a2=10 a3=ffffdc3e29c8 items=0 ppid=4021 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.444000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 12 00:26:13.453630 env[1733]: 2025-07-12 00:26:13.338 [INFO][4249] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85" Jul 12 00:26:13.453630 env[1733]: 2025-07-12 00:26:13.338 [INFO][4249] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85" iface="eth0" netns="/var/run/netns/cni-f8292df5-fa84-fd54-7ec6-46390c4a7a68" Jul 12 00:26:13.453630 env[1733]: 2025-07-12 00:26:13.339 [INFO][4249] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85" iface="eth0" netns="/var/run/netns/cni-f8292df5-fa84-fd54-7ec6-46390c4a7a68" Jul 12 00:26:13.453630 env[1733]: 2025-07-12 00:26:13.345 [INFO][4249] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85" iface="eth0" netns="/var/run/netns/cni-f8292df5-fa84-fd54-7ec6-46390c4a7a68" Jul 12 00:26:13.453630 env[1733]: 2025-07-12 00:26:13.345 [INFO][4249] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85" Jul 12 00:26:13.453630 env[1733]: 2025-07-12 00:26:13.345 [INFO][4249] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85" Jul 12 00:26:13.453630 env[1733]: 2025-07-12 00:26:13.411 [INFO][4256] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85" HandleID="k8s-pod-network.8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85" Workload="ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--tg2s7-eth0" Jul 12 00:26:13.453630 env[1733]: 2025-07-12 00:26:13.412 [INFO][4256] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 12 00:26:13.453630 env[1733]: 2025-07-12 00:26:13.412 [INFO][4256] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 12 00:26:13.453630 env[1733]: 2025-07-12 00:26:13.437 [WARNING][4256] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85" HandleID="k8s-pod-network.8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85" Workload="ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--tg2s7-eth0" Jul 12 00:26:13.453630 env[1733]: 2025-07-12 00:26:13.438 [INFO][4256] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85" HandleID="k8s-pod-network.8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85" Workload="ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--tg2s7-eth0" Jul 12 00:26:13.453630 env[1733]: 2025-07-12 00:26:13.441 [INFO][4256] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 12 00:26:13.453630 env[1733]: 2025-07-12 00:26:13.451 [INFO][4249] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85" Jul 12 00:26:13.459320 systemd[1]: run-netns-cni\x2df8292df5\x2dfa84\x2dfd54\x2d7ec6\x2d46390c4a7a68.mount: Deactivated successfully. Jul 12 00:26:13.462805 env[1733]: time="2025-07-12T00:26:13.462501946Z" level=info msg="TearDown network for sandbox \"8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85\" successfully" Jul 12 00:26:13.462805 env[1733]: time="2025-07-12T00:26:13.462578326Z" level=info msg="StopPodSandbox for \"8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85\" returns successfully" Jul 12 00:26:13.464000 audit: BPF prog-id=162 op=UNLOAD Jul 12 00:26:13.464978 env[1733]: time="2025-07-12T00:26:13.464218591Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-b5644b9bf-tg2s7,Uid:288994cc-ff1d-4a1a-a404-e0b6cf8e19f6,Namespace:calico-apiserver,Attempt:1,}" Jul 12 00:26:13.726000 audit[4297]: NETFILTER_CFG table=raw:101 family=2 entries=21 op=nft_register_chain pid=4297 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 12 00:26:13.726000 audit[4297]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=fffff4ac88e0 a2=0 a3=ffff8c28efa8 items=0 ppid=4021 pid=4297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.726000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 12 00:26:13.769000 audit[4310]: NETFILTER_CFG table=mangle:102 family=2 entries=16 op=nft_register_chain pid=4310 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 12 00:26:13.769000 audit[4310]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=fffff1b99870 a2=0 a3=ffff9f3c6fa8 items=0 ppid=4021 pid=4310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.769000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 12 00:26:13.802000 audit[4309]: NETFILTER_CFG table=nat:103 family=2 entries=15 op=nft_register_chain pid=4309 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 12 00:26:13.802000 audit[4309]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffd66988b0 a2=0 a3=ffffa8d6ffa8 items=0 ppid=4021 pid=4309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.802000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 12 00:26:13.837933 (udev-worker)[4235]: Network interface NamePolicy= disabled on kernel command line. Jul 12 00:26:13.842007 systemd-networkd[1459]: caliac7262059b1: Link UP Jul 12 00:26:13.848463 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliac7262059b1: link becomes ready Jul 12 00:26:13.848796 systemd-networkd[1459]: caliac7262059b1: Gained carrier Jul 12 00:26:13.892477 env[1733]: 2025-07-12 00:26:13.593 [INFO][4266] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--tg2s7-eth0 calico-apiserver-b5644b9bf- calico-apiserver 288994cc-ff1d-4a1a-a404-e0b6cf8e19f6 914 0 2025-07-12 00:25:40 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:b5644b9bf projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-26-167 calico-apiserver-b5644b9bf-tg2s7 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] caliac7262059b1 [] [] }} ContainerID="e337c4de4667bcfe99f8ff8a5ce4df49f8959b57d38965c959864e610bc21761" Namespace="calico-apiserver" Pod="calico-apiserver-b5644b9bf-tg2s7" WorkloadEndpoint="ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--tg2s7-" Jul 12 00:26:13.892477 env[1733]: 2025-07-12 00:26:13.594 [INFO][4266] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="e337c4de4667bcfe99f8ff8a5ce4df49f8959b57d38965c959864e610bc21761" Namespace="calico-apiserver" Pod="calico-apiserver-b5644b9bf-tg2s7" WorkloadEndpoint="ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--tg2s7-eth0" Jul 12 00:26:13.892477 env[1733]: 2025-07-12 00:26:13.687 [INFO][4283] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e337c4de4667bcfe99f8ff8a5ce4df49f8959b57d38965c959864e610bc21761" HandleID="k8s-pod-network.e337c4de4667bcfe99f8ff8a5ce4df49f8959b57d38965c959864e610bc21761" Workload="ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--tg2s7-eth0" Jul 12 00:26:13.892477 env[1733]: 2025-07-12 00:26:13.687 [INFO][4283] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="e337c4de4667bcfe99f8ff8a5ce4df49f8959b57d38965c959864e610bc21761" HandleID="k8s-pod-network.e337c4de4667bcfe99f8ff8a5ce4df49f8959b57d38965c959864e610bc21761" Workload="ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--tg2s7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000254ff0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-26-167", "pod":"calico-apiserver-b5644b9bf-tg2s7", "timestamp":"2025-07-12 00:26:13.687207443 +0000 UTC"}, Hostname:"ip-172-31-26-167", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 12 00:26:13.892477 env[1733]: 2025-07-12 00:26:13.687 [INFO][4283] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 12 00:26:13.892477 env[1733]: 2025-07-12 00:26:13.687 [INFO][4283] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 12 00:26:13.892477 env[1733]: 2025-07-12 00:26:13.687 [INFO][4283] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-26-167' Jul 12 00:26:13.892477 env[1733]: 2025-07-12 00:26:13.735 [INFO][4283] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.e337c4de4667bcfe99f8ff8a5ce4df49f8959b57d38965c959864e610bc21761" host="ip-172-31-26-167" Jul 12 00:26:13.892477 env[1733]: 2025-07-12 00:26:13.753 [INFO][4283] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-26-167" Jul 12 00:26:13.892477 env[1733]: 2025-07-12 00:26:13.785 [INFO][4283] ipam/ipam.go 511: Trying affinity for 192.168.69.192/26 host="ip-172-31-26-167" Jul 12 00:26:13.892477 env[1733]: 2025-07-12 00:26:13.789 [INFO][4283] ipam/ipam.go 158: Attempting to load block cidr=192.168.69.192/26 host="ip-172-31-26-167" Jul 12 00:26:13.892477 env[1733]: 2025-07-12 00:26:13.798 [INFO][4283] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.69.192/26 host="ip-172-31-26-167" Jul 12 00:26:13.892477 env[1733]: 2025-07-12 00:26:13.798 [INFO][4283] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.69.192/26 handle="k8s-pod-network.e337c4de4667bcfe99f8ff8a5ce4df49f8959b57d38965c959864e610bc21761" host="ip-172-31-26-167" Jul 12 00:26:13.892477 env[1733]: 2025-07-12 00:26:13.801 [INFO][4283] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.e337c4de4667bcfe99f8ff8a5ce4df49f8959b57d38965c959864e610bc21761 Jul 12 00:26:13.892477 env[1733]: 2025-07-12 00:26:13.810 [INFO][4283] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.69.192/26 handle="k8s-pod-network.e337c4de4667bcfe99f8ff8a5ce4df49f8959b57d38965c959864e610bc21761" host="ip-172-31-26-167" Jul 12 00:26:13.892477 env[1733]: 2025-07-12 00:26:13.826 [INFO][4283] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.69.194/26] block=192.168.69.192/26 handle="k8s-pod-network.e337c4de4667bcfe99f8ff8a5ce4df49f8959b57d38965c959864e610bc21761" host="ip-172-31-26-167" Jul 12 00:26:13.892477 env[1733]: 2025-07-12 00:26:13.826 [INFO][4283] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.69.194/26] handle="k8s-pod-network.e337c4de4667bcfe99f8ff8a5ce4df49f8959b57d38965c959864e610bc21761" host="ip-172-31-26-167" Jul 12 00:26:13.892477 env[1733]: 2025-07-12 00:26:13.826 [INFO][4283] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 12 00:26:13.892477 env[1733]: 2025-07-12 00:26:13.826 [INFO][4283] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.69.194/26] IPv6=[] ContainerID="e337c4de4667bcfe99f8ff8a5ce4df49f8959b57d38965c959864e610bc21761" HandleID="k8s-pod-network.e337c4de4667bcfe99f8ff8a5ce4df49f8959b57d38965c959864e610bc21761" Workload="ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--tg2s7-eth0" Jul 12 00:26:13.893919 env[1733]: 2025-07-12 00:26:13.833 [INFO][4266] cni-plugin/k8s.go 418: Populated endpoint ContainerID="e337c4de4667bcfe99f8ff8a5ce4df49f8959b57d38965c959864e610bc21761" Namespace="calico-apiserver" Pod="calico-apiserver-b5644b9bf-tg2s7" WorkloadEndpoint="ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--tg2s7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--tg2s7-eth0", GenerateName:"calico-apiserver-b5644b9bf-", Namespace:"calico-apiserver", SelfLink:"", UID:"288994cc-ff1d-4a1a-a404-e0b6cf8e19f6", ResourceVersion:"914", Generation:0, CreationTimestamp:time.Date(2025, time.July, 12, 0, 25, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"b5644b9bf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-167", ContainerID:"", Pod:"calico-apiserver-b5644b9bf-tg2s7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.69.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliac7262059b1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 12 00:26:13.893919 env[1733]: 2025-07-12 00:26:13.833 [INFO][4266] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.69.194/32] ContainerID="e337c4de4667bcfe99f8ff8a5ce4df49f8959b57d38965c959864e610bc21761" Namespace="calico-apiserver" Pod="calico-apiserver-b5644b9bf-tg2s7" WorkloadEndpoint="ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--tg2s7-eth0" Jul 12 00:26:13.893919 env[1733]: 2025-07-12 00:26:13.833 [INFO][4266] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliac7262059b1 ContainerID="e337c4de4667bcfe99f8ff8a5ce4df49f8959b57d38965c959864e610bc21761" Namespace="calico-apiserver" Pod="calico-apiserver-b5644b9bf-tg2s7" WorkloadEndpoint="ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--tg2s7-eth0" Jul 12 00:26:13.893919 env[1733]: 2025-07-12 00:26:13.859 [INFO][4266] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e337c4de4667bcfe99f8ff8a5ce4df49f8959b57d38965c959864e610bc21761" Namespace="calico-apiserver" Pod="calico-apiserver-b5644b9bf-tg2s7" WorkloadEndpoint="ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--tg2s7-eth0" Jul 12 00:26:13.893919 env[1733]: 2025-07-12 00:26:13.861 [INFO][4266] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="e337c4de4667bcfe99f8ff8a5ce4df49f8959b57d38965c959864e610bc21761" Namespace="calico-apiserver" Pod="calico-apiserver-b5644b9bf-tg2s7" WorkloadEndpoint="ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--tg2s7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--tg2s7-eth0", GenerateName:"calico-apiserver-b5644b9bf-", Namespace:"calico-apiserver", SelfLink:"", UID:"288994cc-ff1d-4a1a-a404-e0b6cf8e19f6", ResourceVersion:"914", Generation:0, CreationTimestamp:time.Date(2025, time.July, 12, 0, 25, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"b5644b9bf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-167", ContainerID:"e337c4de4667bcfe99f8ff8a5ce4df49f8959b57d38965c959864e610bc21761", Pod:"calico-apiserver-b5644b9bf-tg2s7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.69.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliac7262059b1", MAC:"66:7b:c5:83:a2:8b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 12 00:26:13.893919 env[1733]: 2025-07-12 00:26:13.886 [INFO][4266] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="e337c4de4667bcfe99f8ff8a5ce4df49f8959b57d38965c959864e610bc21761" Namespace="calico-apiserver" Pod="calico-apiserver-b5644b9bf-tg2s7" WorkloadEndpoint="ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--tg2s7-eth0" Jul 12 00:26:13.831000 audit[4312]: NETFILTER_CFG table=filter:104 family=2 entries=94 op=nft_register_chain pid=4312 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 12 00:26:13.831000 audit[4312]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=53116 a0=3 a1=ffffd6f3d7c0 a2=0 a3=ffff84df9fa8 items=0 ppid=4021 pid=4312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.831000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 12 00:26:13.961071 env[1733]: time="2025-07-12T00:26:13.960963770Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 12 00:26:13.961303 env[1733]: time="2025-07-12T00:26:13.961041313Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 12 00:26:13.961303 env[1733]: time="2025-07-12T00:26:13.961068853Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 12 00:26:13.961542 env[1733]: time="2025-07-12T00:26:13.961361806Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e337c4de4667bcfe99f8ff8a5ce4df49f8959b57d38965c959864e610bc21761 pid=4332 runtime=io.containerd.runc.v2 Jul 12 00:26:13.987000 audit[4344]: NETFILTER_CFG table=filter:105 family=2 entries=50 op=nft_register_chain pid=4344 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 12 00:26:13.987000 audit[4344]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=28208 a0=3 a1=ffffc1fffb20 a2=0 a3=ffffb3bc7fa8 items=0 ppid=4021 pid=4344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:13.987000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 12 00:26:14.004670 systemd[1]: Started cri-containerd-e337c4de4667bcfe99f8ff8a5ce4df49f8959b57d38965c959864e610bc21761.scope. Jul 12 00:26:14.021806 systemd[1]: run-containerd-runc-k8s.io-e337c4de4667bcfe99f8ff8a5ce4df49f8959b57d38965c959864e610bc21761-runc.T8pIbD.mount: Deactivated successfully. Jul 12 00:26:14.032249 systemd-networkd[1459]: vxlan.calico: Gained IPv6LL Jul 12 00:26:14.068407 env[1733]: time="2025-07-12T00:26:14.068330023Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:26:14.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.078815 kernel: kauditd_printk_skb: 650 callbacks suppressed Jul 12 00:26:14.078942 kernel: audit: type=1400 audit(1752279974.075:1146): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.081651 env[1733]: time="2025-07-12T00:26:14.081596240Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:309942601a9ca6c4e92bcd09162824fef1c137a5c5d92fbbb45be0f29bfd1817,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:26:14.085343 env[1733]: time="2025-07-12T00:26:14.085289993Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/whisker:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:26:14.089077 env[1733]: time="2025-07-12T00:26:14.089022399Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker@sha256:31346d4524252a3b0d2a1d289c4985b8402b498b5ce82a12e682096ab7446678,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:26:14.091155 env[1733]: time="2025-07-12T00:26:14.090276654Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.2\" returns image reference \"sha256:309942601a9ca6c4e92bcd09162824fef1c137a5c5d92fbbb45be0f29bfd1817\"" Jul 12 00:26:14.100454 kernel: audit: type=1400 audit(1752279974.075:1147): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.109112 kernel: audit: type=1400 audit(1752279974.075:1148): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.117225 kernel: audit: type=1400 audit(1752279974.075:1149): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.125270 kernel: audit: type=1400 audit(1752279974.075:1150): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.125428 env[1733]: time="2025-07-12T00:26:14.118911905Z" level=info msg="CreateContainer within sandbox \"f46a5340ea79b455bd77b3faaac4890c99870f93fac42616e3714bd8d77168fb\" for container &ContainerMetadata{Name:whisker,Attempt:0,}" Jul 12 00:26:14.136594 kernel: audit: type=1400 audit(1752279974.075:1151): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.144690 kernel: audit: type=1400 audit(1752279974.075:1152): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.153707 kernel: audit: type=1400 audit(1752279974.075:1153): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.163166 kernel: audit: type=1400 audit(1752279974.075:1154): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.171154 kernel: audit: type=1400 audit(1752279974.075:1155): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.075000 audit: BPF prog-id=168 op=LOAD Jul 12 00:26:14.087000 audit[4343]: AVC avc: denied { bpf } for pid=4343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.087000 audit[4343]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4332 pid=4343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:14.087000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533333763346465343636376263666539396638666638613563653464 Jul 12 00:26:14.087000 audit[4343]: AVC avc: denied { perfmon } for pid=4343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.087000 audit[4343]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4332 pid=4343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:14.087000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533333763346465343636376263666539396638666638613563653464 Jul 12 00:26:14.087000 audit[4343]: AVC avc: denied { bpf } for pid=4343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.087000 audit[4343]: AVC avc: denied { bpf } for pid=4343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.087000 audit[4343]: AVC avc: denied { bpf } for pid=4343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.087000 audit[4343]: AVC avc: denied { perfmon } for pid=4343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.087000 audit[4343]: AVC avc: denied { perfmon } for pid=4343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.087000 audit[4343]: AVC avc: denied { perfmon } for pid=4343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.087000 audit[4343]: AVC avc: denied { perfmon } for pid=4343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.087000 audit[4343]: AVC avc: denied { perfmon } for pid=4343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.087000 audit[4343]: AVC avc: denied { bpf } for pid=4343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.087000 audit[4343]: AVC avc: denied { bpf } for pid=4343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.087000 audit: BPF prog-id=169 op=LOAD Jul 12 00:26:14.087000 audit[4343]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4332 pid=4343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:14.087000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533333763346465343636376263666539396638666638613563653464 Jul 12 00:26:14.087000 audit[4343]: AVC avc: denied { bpf } for pid=4343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.087000 audit[4343]: AVC avc: denied { bpf } for pid=4343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.087000 audit[4343]: AVC avc: denied { perfmon } for pid=4343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.087000 audit[4343]: AVC avc: denied { perfmon } for pid=4343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.087000 audit[4343]: AVC avc: denied { perfmon } for pid=4343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.087000 audit[4343]: AVC avc: denied { perfmon } for pid=4343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.087000 audit[4343]: AVC avc: denied { perfmon } for pid=4343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.087000 audit[4343]: AVC avc: denied { bpf } for pid=4343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.087000 audit[4343]: AVC avc: denied { bpf } for pid=4343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.087000 audit: BPF prog-id=170 op=LOAD Jul 12 00:26:14.087000 audit[4343]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4332 pid=4343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:14.087000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533333763346465343636376263666539396638666638613563653464 Jul 12 00:26:14.087000 audit: BPF prog-id=170 op=UNLOAD Jul 12 00:26:14.087000 audit: BPF prog-id=169 op=UNLOAD Jul 12 00:26:14.087000 audit[4343]: AVC avc: denied { bpf } for pid=4343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.087000 audit[4343]: AVC avc: denied { bpf } for pid=4343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.087000 audit[4343]: AVC avc: denied { bpf } for pid=4343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.087000 audit[4343]: AVC avc: denied { perfmon } for pid=4343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.087000 audit[4343]: AVC avc: denied { perfmon } for pid=4343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.087000 audit[4343]: AVC avc: denied { perfmon } for pid=4343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.087000 audit[4343]: AVC avc: denied { perfmon } for pid=4343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.087000 audit[4343]: AVC avc: denied { perfmon } for pid=4343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.087000 audit[4343]: AVC avc: denied { bpf } for pid=4343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.087000 audit[4343]: AVC avc: denied { bpf } for pid=4343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.087000 audit: BPF prog-id=171 op=LOAD Jul 12 00:26:14.087000 audit[4343]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4332 pid=4343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:14.087000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533333763346465343636376263666539396638666638613563653464 Jul 12 00:26:14.183428 env[1733]: time="2025-07-12T00:26:14.182590024Z" level=info msg="StopPodSandbox for \"13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd\"" Jul 12 00:26:14.185086 env[1733]: time="2025-07-12T00:26:14.184813236Z" level=info msg="StopPodSandbox for \"808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26\"" Jul 12 00:26:14.185691 env[1733]: time="2025-07-12T00:26:14.185636695Z" level=info msg="StopPodSandbox for \"c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa\"" Jul 12 00:26:14.190009 env[1733]: time="2025-07-12T00:26:14.189942864Z" level=info msg="StopPodSandbox for \"10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8\"" Jul 12 00:26:14.227897 env[1733]: time="2025-07-12T00:26:14.227607054Z" level=info msg="CreateContainer within sandbox \"f46a5340ea79b455bd77b3faaac4890c99870f93fac42616e3714bd8d77168fb\" for &ContainerMetadata{Name:whisker,Attempt:0,} returns container id \"ca5f90be5df61cee6bef4cada74f30ab0d285bb2c393a5972e5666ea6285b3d4\"" Jul 12 00:26:14.231349 env[1733]: time="2025-07-12T00:26:14.231272560Z" level=info msg="StartContainer for \"ca5f90be5df61cee6bef4cada74f30ab0d285bb2c393a5972e5666ea6285b3d4\"" Jul 12 00:26:14.264709 env[1733]: time="2025-07-12T00:26:14.264508289Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-b5644b9bf-tg2s7,Uid:288994cc-ff1d-4a1a-a404-e0b6cf8e19f6,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"e337c4de4667bcfe99f8ff8a5ce4df49f8959b57d38965c959864e610bc21761\"" Jul 12 00:26:14.283058 env[1733]: time="2025-07-12T00:26:14.280998307Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.2\"" Jul 12 00:26:14.364637 systemd[1]: Started cri-containerd-ca5f90be5df61cee6bef4cada74f30ab0d285bb2c393a5972e5666ea6285b3d4.scope. Jul 12 00:26:14.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.627000 audit: BPF prog-id=172 op=LOAD Jul 12 00:26:14.628000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.628000 audit[4431]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4075 pid=4431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:14.628000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361356639306265356466363163656536626566346361646137346633 Jul 12 00:26:14.629000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.629000 audit[4431]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4075 pid=4431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:14.629000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361356639306265356466363163656536626566346361646137346633 Jul 12 00:26:14.629000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.629000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.629000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.629000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.629000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.629000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.629000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.629000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.629000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.629000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.629000 audit: BPF prog-id=173 op=LOAD Jul 12 00:26:14.629000 audit[4431]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4075 pid=4431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:14.629000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361356639306265356466363163656536626566346361646137346633 Jul 12 00:26:14.629000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.629000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.629000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.629000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.629000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.629000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.629000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.629000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.629000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.629000 audit: BPF prog-id=174 op=LOAD Jul 12 00:26:14.629000 audit[4431]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4075 pid=4431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:14.629000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361356639306265356466363163656536626566346361646137346633 Jul 12 00:26:14.630000 audit: BPF prog-id=174 op=UNLOAD Jul 12 00:26:14.630000 audit: BPF prog-id=173 op=UNLOAD Jul 12 00:26:14.630000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.630000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.630000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.630000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.630000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.630000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.630000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.630000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.630000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.630000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:14.630000 audit: BPF prog-id=175 op=LOAD Jul 12 00:26:14.630000 audit[4431]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4075 pid=4431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:14.630000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361356639306265356466363163656536626566346361646137346633 Jul 12 00:26:14.772591 env[1733]: time="2025-07-12T00:26:14.772525430Z" level=info msg="StartContainer for \"ca5f90be5df61cee6bef4cada74f30ab0d285bb2c393a5972e5666ea6285b3d4\" returns successfully" Jul 12 00:26:14.817714 env[1733]: 2025-07-12 00:26:14.564 [INFO][4392] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd" Jul 12 00:26:14.817714 env[1733]: 2025-07-12 00:26:14.564 [INFO][4392] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd" iface="eth0" netns="/var/run/netns/cni-be4742c9-981a-e450-5985-cdb43ad730aa" Jul 12 00:26:14.817714 env[1733]: 2025-07-12 00:26:14.564 [INFO][4392] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd" iface="eth0" netns="/var/run/netns/cni-be4742c9-981a-e450-5985-cdb43ad730aa" Jul 12 00:26:14.817714 env[1733]: 2025-07-12 00:26:14.565 [INFO][4392] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd" iface="eth0" netns="/var/run/netns/cni-be4742c9-981a-e450-5985-cdb43ad730aa" Jul 12 00:26:14.817714 env[1733]: 2025-07-12 00:26:14.565 [INFO][4392] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd" Jul 12 00:26:14.817714 env[1733]: 2025-07-12 00:26:14.565 [INFO][4392] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd" Jul 12 00:26:14.817714 env[1733]: 2025-07-12 00:26:14.751 [INFO][4459] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd" HandleID="k8s-pod-network.13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd" Workload="ip--172--31--26--167-k8s-coredns--7c65d6cfc9--rtg8v-eth0" Jul 12 00:26:14.817714 env[1733]: 2025-07-12 00:26:14.754 [INFO][4459] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 12 00:26:14.817714 env[1733]: 2025-07-12 00:26:14.754 [INFO][4459] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 12 00:26:14.817714 env[1733]: 2025-07-12 00:26:14.770 [WARNING][4459] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd" HandleID="k8s-pod-network.13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd" Workload="ip--172--31--26--167-k8s-coredns--7c65d6cfc9--rtg8v-eth0" Jul 12 00:26:14.817714 env[1733]: 2025-07-12 00:26:14.770 [INFO][4459] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd" HandleID="k8s-pod-network.13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd" Workload="ip--172--31--26--167-k8s-coredns--7c65d6cfc9--rtg8v-eth0" Jul 12 00:26:14.817714 env[1733]: 2025-07-12 00:26:14.777 [INFO][4459] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 12 00:26:14.817714 env[1733]: 2025-07-12 00:26:14.785 [INFO][4392] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd" Jul 12 00:26:14.823673 systemd[1]: run-netns-cni\x2dbe4742c9\x2d981a\x2de450\x2d5985\x2dcdb43ad730aa.mount: Deactivated successfully. Jul 12 00:26:14.826248 env[1733]: time="2025-07-12T00:26:14.826188061Z" level=info msg="TearDown network for sandbox \"13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd\" successfully" Jul 12 00:26:14.826414 env[1733]: time="2025-07-12T00:26:14.826378200Z" level=info msg="StopPodSandbox for \"13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd\" returns successfully" Jul 12 00:26:14.828086 env[1733]: time="2025-07-12T00:26:14.828027288Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-rtg8v,Uid:4f42c96b-24be-48e4-ba92-a05f74184848,Namespace:kube-system,Attempt:1,}" Jul 12 00:26:14.897000 audit[4448]: AVC avc: denied { search } for pid=4448 comm="nginx" name="crypto" dev="proc" ino=23569 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c702 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 12 00:26:14.897000 audit[4448]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffbaa77958 a2=0 a3=0 items=0 ppid=4075 pid=4448 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="nginx" exe="/usr/sbin/nginx" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c702 key=(null) Jul 12 00:26:14.897000 audit: PROCTITLE proctitle=2F7573722F7362696E2F6E67696E78002D67006461656D6F6E206F66663B Jul 12 00:26:14.952933 env[1733]: 2025-07-12 00:26:14.660 [INFO][4421] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa" Jul 12 00:26:14.952933 env[1733]: 2025-07-12 00:26:14.661 [INFO][4421] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa" iface="eth0" netns="/var/run/netns/cni-735300d8-a057-d438-4473-5ef1e0bd06c6" Jul 12 00:26:14.952933 env[1733]: 2025-07-12 00:26:14.661 [INFO][4421] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa" iface="eth0" netns="/var/run/netns/cni-735300d8-a057-d438-4473-5ef1e0bd06c6" Jul 12 00:26:14.952933 env[1733]: 2025-07-12 00:26:14.661 [INFO][4421] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa" iface="eth0" netns="/var/run/netns/cni-735300d8-a057-d438-4473-5ef1e0bd06c6" Jul 12 00:26:14.952933 env[1733]: 2025-07-12 00:26:14.661 [INFO][4421] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa" Jul 12 00:26:14.952933 env[1733]: 2025-07-12 00:26:14.661 [INFO][4421] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa" Jul 12 00:26:14.952933 env[1733]: 2025-07-12 00:26:14.882 [INFO][4471] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa" HandleID="k8s-pod-network.c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa" Workload="ip--172--31--26--167-k8s-coredns--7c65d6cfc9--5lbr6-eth0" Jul 12 00:26:14.952933 env[1733]: 2025-07-12 00:26:14.902 [INFO][4471] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 12 00:26:14.952933 env[1733]: 2025-07-12 00:26:14.903 [INFO][4471] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 12 00:26:14.952933 env[1733]: 2025-07-12 00:26:14.924 [WARNING][4471] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa" HandleID="k8s-pod-network.c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa" Workload="ip--172--31--26--167-k8s-coredns--7c65d6cfc9--5lbr6-eth0" Jul 12 00:26:14.952933 env[1733]: 2025-07-12 00:26:14.931 [INFO][4471] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa" HandleID="k8s-pod-network.c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa" Workload="ip--172--31--26--167-k8s-coredns--7c65d6cfc9--5lbr6-eth0" Jul 12 00:26:14.952933 env[1733]: 2025-07-12 00:26:14.937 [INFO][4471] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 12 00:26:14.952933 env[1733]: 2025-07-12 00:26:14.949 [INFO][4421] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa" Jul 12 00:26:14.959110 env[1733]: time="2025-07-12T00:26:14.959043621Z" level=info msg="TearDown network for sandbox \"c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa\" successfully" Jul 12 00:26:14.959335 env[1733]: time="2025-07-12T00:26:14.959298811Z" level=info msg="StopPodSandbox for \"c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa\" returns successfully" Jul 12 00:26:14.963803 systemd[1]: run-netns-cni\x2d735300d8\x2da057\x2dd438\x2d4473\x2d5ef1e0bd06c6.mount: Deactivated successfully. Jul 12 00:26:14.967127 env[1733]: time="2025-07-12T00:26:14.967055952Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-5lbr6,Uid:17e5c7cc-19eb-4973-833d-c011599b9537,Namespace:kube-system,Attempt:1,}" Jul 12 00:26:15.016026 env[1733]: 2025-07-12 00:26:14.605 [INFO][4416] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26" Jul 12 00:26:15.016026 env[1733]: 2025-07-12 00:26:14.605 [INFO][4416] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26" iface="eth0" netns="/var/run/netns/cni-b2bab183-1e7f-cc9d-108c-4e2949158cc4" Jul 12 00:26:15.016026 env[1733]: 2025-07-12 00:26:14.605 [INFO][4416] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26" iface="eth0" netns="/var/run/netns/cni-b2bab183-1e7f-cc9d-108c-4e2949158cc4" Jul 12 00:26:15.016026 env[1733]: 2025-07-12 00:26:14.606 [INFO][4416] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26" iface="eth0" netns="/var/run/netns/cni-b2bab183-1e7f-cc9d-108c-4e2949158cc4" Jul 12 00:26:15.016026 env[1733]: 2025-07-12 00:26:14.606 [INFO][4416] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26" Jul 12 00:26:15.016026 env[1733]: 2025-07-12 00:26:14.606 [INFO][4416] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26" Jul 12 00:26:15.016026 env[1733]: 2025-07-12 00:26:14.969 [INFO][4466] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26" HandleID="k8s-pod-network.808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26" Workload="ip--172--31--26--167-k8s-goldmane--58fd7646b9--rmlz5-eth0" Jul 12 00:26:15.016026 env[1733]: 2025-07-12 00:26:14.971 [INFO][4466] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 12 00:26:15.016026 env[1733]: 2025-07-12 00:26:14.971 [INFO][4466] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 12 00:26:15.016026 env[1733]: 2025-07-12 00:26:14.997 [WARNING][4466] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26" HandleID="k8s-pod-network.808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26" Workload="ip--172--31--26--167-k8s-goldmane--58fd7646b9--rmlz5-eth0" Jul 12 00:26:15.016026 env[1733]: 2025-07-12 00:26:14.997 [INFO][4466] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26" HandleID="k8s-pod-network.808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26" Workload="ip--172--31--26--167-k8s-goldmane--58fd7646b9--rmlz5-eth0" Jul 12 00:26:15.016026 env[1733]: 2025-07-12 00:26:15.000 [INFO][4466] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 12 00:26:15.016026 env[1733]: 2025-07-12 00:26:15.008 [INFO][4416] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26" Jul 12 00:26:15.017074 env[1733]: time="2025-07-12T00:26:15.016241419Z" level=info msg="TearDown network for sandbox \"808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26\" successfully" Jul 12 00:26:15.017074 env[1733]: time="2025-07-12T00:26:15.016293679Z" level=info msg="StopPodSandbox for \"808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26\" returns successfully" Jul 12 00:26:15.017216 env[1733]: time="2025-07-12T00:26:15.017178722Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-58fd7646b9-rmlz5,Uid:1de9e718-b4cc-4c55-aca5-2a9b50b71c00,Namespace:calico-system,Attempt:1,}" Jul 12 00:26:15.041972 env[1733]: 2025-07-12 00:26:14.675 [INFO][4427] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8" Jul 12 00:26:15.041972 env[1733]: 2025-07-12 00:26:14.675 [INFO][4427] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8" iface="eth0" netns="/var/run/netns/cni-fb66c538-82d9-de08-ab91-7833ed96d5b4" Jul 12 00:26:15.041972 env[1733]: 2025-07-12 00:26:14.677 [INFO][4427] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8" iface="eth0" netns="/var/run/netns/cni-fb66c538-82d9-de08-ab91-7833ed96d5b4" Jul 12 00:26:15.041972 env[1733]: 2025-07-12 00:26:14.682 [INFO][4427] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8" iface="eth0" netns="/var/run/netns/cni-fb66c538-82d9-de08-ab91-7833ed96d5b4" Jul 12 00:26:15.041972 env[1733]: 2025-07-12 00:26:14.682 [INFO][4427] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8" Jul 12 00:26:15.041972 env[1733]: 2025-07-12 00:26:14.682 [INFO][4427] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8" Jul 12 00:26:15.041972 env[1733]: 2025-07-12 00:26:14.970 [INFO][4476] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8" HandleID="k8s-pod-network.10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8" Workload="ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--kx5cn-eth0" Jul 12 00:26:15.041972 env[1733]: 2025-07-12 00:26:14.973 [INFO][4476] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 12 00:26:15.041972 env[1733]: 2025-07-12 00:26:15.000 [INFO][4476] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 12 00:26:15.041972 env[1733]: 2025-07-12 00:26:15.018 [WARNING][4476] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8" HandleID="k8s-pod-network.10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8" Workload="ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--kx5cn-eth0" Jul 12 00:26:15.041972 env[1733]: 2025-07-12 00:26:15.018 [INFO][4476] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8" HandleID="k8s-pod-network.10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8" Workload="ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--kx5cn-eth0" Jul 12 00:26:15.041972 env[1733]: 2025-07-12 00:26:15.027 [INFO][4476] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 12 00:26:15.041972 env[1733]: 2025-07-12 00:26:15.038 [INFO][4427] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8" Jul 12 00:26:15.043040 env[1733]: time="2025-07-12T00:26:15.042222276Z" level=info msg="TearDown network for sandbox \"10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8\" successfully" Jul 12 00:26:15.043040 env[1733]: time="2025-07-12T00:26:15.042267756Z" level=info msg="StopPodSandbox for \"10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8\" returns successfully" Jul 12 00:26:15.044302 env[1733]: time="2025-07-12T00:26:15.044241037Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-b5644b9bf-kx5cn,Uid:e3812f81-11a9-4dfb-a0f5-cf6c3ca45a4d,Namespace:calico-apiserver,Attempt:1,}" Jul 12 00:26:15.091000 audit[2517]: AVC avc: denied { watch } for pid=2517 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=7348 scontext=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:26:15.091000 audit[2517]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=70 a1=40083305d0 a2=fc6 a3=0 items=0 ppid=2367 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 key=(null) Jul 12 00:26:15.091000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 12 00:26:15.091000 audit[2517]: AVC avc: denied { watch } for pid=2517 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=7346 scontext=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:26:15.091000 audit[2517]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4008368660 a2=fc6 a3=0 items=0 ppid=2367 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 key=(null) Jul 12 00:26:15.091000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 12 00:26:15.098000 audit[2517]: AVC avc: denied { watch } for pid=2517 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=7350 scontext=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:26:15.098000 audit[2517]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=70 a1=4008330690 a2=fc6 a3=0 items=0 ppid=2367 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 key=(null) Jul 12 00:26:15.098000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 12 00:26:15.115000 audit[2517]: AVC avc: denied { watch } for pid=2517 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7344 scontext=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:26:15.115000 audit[2517]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=70 a1=400a4893a0 a2=fc6 a3=0 items=0 ppid=2367 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 key=(null) Jul 12 00:26:15.115000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 12 00:26:15.130000 audit[2517]: AVC avc: denied { watch } for pid=2517 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7344 scontext=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:26:15.130000 audit[2517]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=70 a1=400a4893c0 a2=fc6 a3=0 items=0 ppid=2367 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 key=(null) Jul 12 00:26:15.130000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 12 00:26:15.130000 audit[2517]: AVC avc: denied { watch } for pid=2517 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=7348 scontext=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:26:15.130000 audit[2517]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=70 a1=4008330720 a2=fc6 a3=0 items=0 ppid=2367 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 key=(null) Jul 12 00:26:15.130000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 12 00:26:15.185106 env[1733]: time="2025-07-12T00:26:15.182985396Z" level=info msg="StopPodSandbox for \"6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b\"" Jul 12 00:26:15.329789 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 12 00:26:15.329935 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6048bf267e3: link becomes ready Jul 12 00:26:15.332740 systemd-networkd[1459]: cali6048bf267e3: Link UP Jul 12 00:26:15.333185 systemd-networkd[1459]: cali6048bf267e3: Gained carrier Jul 12 00:26:15.357000 audit[2485]: AVC avc: denied { watch } for pid=2485 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=7348 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:26:15.357000 audit[2485]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40020c89c0 a2=fc6 a3=0 items=0 ppid=2324 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c411 key=(null) Jul 12 00:26:15.357000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 12 00:26:15.373000 audit[2485]: AVC avc: denied { watch } for pid=2485 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7344 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:26:15.373000 audit[2485]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000af1e20 a2=fc6 a3=0 items=0 ppid=2324 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c411 key=(null) Jul 12 00:26:15.373000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 12 00:26:15.376768 env[1733]: 2025-07-12 00:26:15.030 [INFO][4490] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--26--167-k8s-coredns--7c65d6cfc9--rtg8v-eth0 coredns-7c65d6cfc9- kube-system 4f42c96b-24be-48e4-ba92-a05f74184848 928 0 2025-07-12 00:25:24 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7c65d6cfc9 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-26-167 coredns-7c65d6cfc9-rtg8v eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali6048bf267e3 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="77f1f75d1159c36709fa225bb17fcdabe9a6cef1c6191891758e7b75bef618ee" Namespace="kube-system" Pod="coredns-7c65d6cfc9-rtg8v" WorkloadEndpoint="ip--172--31--26--167-k8s-coredns--7c65d6cfc9--rtg8v-" Jul 12 00:26:15.376768 env[1733]: 2025-07-12 00:26:15.030 [INFO][4490] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="77f1f75d1159c36709fa225bb17fcdabe9a6cef1c6191891758e7b75bef618ee" Namespace="kube-system" Pod="coredns-7c65d6cfc9-rtg8v" WorkloadEndpoint="ip--172--31--26--167-k8s-coredns--7c65d6cfc9--rtg8v-eth0" Jul 12 00:26:15.376768 env[1733]: 2025-07-12 00:26:15.184 [INFO][4515] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="77f1f75d1159c36709fa225bb17fcdabe9a6cef1c6191891758e7b75bef618ee" HandleID="k8s-pod-network.77f1f75d1159c36709fa225bb17fcdabe9a6cef1c6191891758e7b75bef618ee" Workload="ip--172--31--26--167-k8s-coredns--7c65d6cfc9--rtg8v-eth0" Jul 12 00:26:15.376768 env[1733]: 2025-07-12 00:26:15.187 [INFO][4515] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="77f1f75d1159c36709fa225bb17fcdabe9a6cef1c6191891758e7b75bef618ee" HandleID="k8s-pod-network.77f1f75d1159c36709fa225bb17fcdabe9a6cef1c6191891758e7b75bef618ee" Workload="ip--172--31--26--167-k8s-coredns--7c65d6cfc9--rtg8v-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004db50), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-26-167", "pod":"coredns-7c65d6cfc9-rtg8v", "timestamp":"2025-07-12 00:26:15.184943018 +0000 UTC"}, Hostname:"ip-172-31-26-167", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 12 00:26:15.376768 env[1733]: 2025-07-12 00:26:15.187 [INFO][4515] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 12 00:26:15.376768 env[1733]: 2025-07-12 00:26:15.188 [INFO][4515] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 12 00:26:15.376768 env[1733]: 2025-07-12 00:26:15.188 [INFO][4515] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-26-167' Jul 12 00:26:15.376768 env[1733]: 2025-07-12 00:26:15.217 [INFO][4515] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.77f1f75d1159c36709fa225bb17fcdabe9a6cef1c6191891758e7b75bef618ee" host="ip-172-31-26-167" Jul 12 00:26:15.376768 env[1733]: 2025-07-12 00:26:15.231 [INFO][4515] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-26-167" Jul 12 00:26:15.376768 env[1733]: 2025-07-12 00:26:15.250 [INFO][4515] ipam/ipam.go 511: Trying affinity for 192.168.69.192/26 host="ip-172-31-26-167" Jul 12 00:26:15.376768 env[1733]: 2025-07-12 00:26:15.256 [INFO][4515] ipam/ipam.go 158: Attempting to load block cidr=192.168.69.192/26 host="ip-172-31-26-167" Jul 12 00:26:15.376768 env[1733]: 2025-07-12 00:26:15.275 [INFO][4515] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.69.192/26 host="ip-172-31-26-167" Jul 12 00:26:15.376768 env[1733]: 2025-07-12 00:26:15.275 [INFO][4515] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.69.192/26 handle="k8s-pod-network.77f1f75d1159c36709fa225bb17fcdabe9a6cef1c6191891758e7b75bef618ee" host="ip-172-31-26-167" Jul 12 00:26:15.376768 env[1733]: 2025-07-12 00:26:15.283 [INFO][4515] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.77f1f75d1159c36709fa225bb17fcdabe9a6cef1c6191891758e7b75bef618ee Jul 12 00:26:15.376768 env[1733]: 2025-07-12 00:26:15.295 [INFO][4515] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.69.192/26 handle="k8s-pod-network.77f1f75d1159c36709fa225bb17fcdabe9a6cef1c6191891758e7b75bef618ee" host="ip-172-31-26-167" Jul 12 00:26:15.376768 env[1733]: 2025-07-12 00:26:15.312 [INFO][4515] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.69.195/26] block=192.168.69.192/26 handle="k8s-pod-network.77f1f75d1159c36709fa225bb17fcdabe9a6cef1c6191891758e7b75bef618ee" host="ip-172-31-26-167" Jul 12 00:26:15.376768 env[1733]: 2025-07-12 00:26:15.313 [INFO][4515] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.69.195/26] handle="k8s-pod-network.77f1f75d1159c36709fa225bb17fcdabe9a6cef1c6191891758e7b75bef618ee" host="ip-172-31-26-167" Jul 12 00:26:15.376768 env[1733]: 2025-07-12 00:26:15.313 [INFO][4515] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 12 00:26:15.376768 env[1733]: 2025-07-12 00:26:15.313 [INFO][4515] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.69.195/26] IPv6=[] ContainerID="77f1f75d1159c36709fa225bb17fcdabe9a6cef1c6191891758e7b75bef618ee" HandleID="k8s-pod-network.77f1f75d1159c36709fa225bb17fcdabe9a6cef1c6191891758e7b75bef618ee" Workload="ip--172--31--26--167-k8s-coredns--7c65d6cfc9--rtg8v-eth0" Jul 12 00:26:15.378113 env[1733]: 2025-07-12 00:26:15.317 [INFO][4490] cni-plugin/k8s.go 418: Populated endpoint ContainerID="77f1f75d1159c36709fa225bb17fcdabe9a6cef1c6191891758e7b75bef618ee" Namespace="kube-system" Pod="coredns-7c65d6cfc9-rtg8v" WorkloadEndpoint="ip--172--31--26--167-k8s-coredns--7c65d6cfc9--rtg8v-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--167-k8s-coredns--7c65d6cfc9--rtg8v-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"4f42c96b-24be-48e4-ba92-a05f74184848", ResourceVersion:"928", Generation:0, CreationTimestamp:time.Date(2025, time.July, 12, 0, 25, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-167", ContainerID:"", Pod:"coredns-7c65d6cfc9-rtg8v", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.69.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6048bf267e3", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 12 00:26:15.378113 env[1733]: 2025-07-12 00:26:15.317 [INFO][4490] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.69.195/32] ContainerID="77f1f75d1159c36709fa225bb17fcdabe9a6cef1c6191891758e7b75bef618ee" Namespace="kube-system" Pod="coredns-7c65d6cfc9-rtg8v" WorkloadEndpoint="ip--172--31--26--167-k8s-coredns--7c65d6cfc9--rtg8v-eth0" Jul 12 00:26:15.378113 env[1733]: 2025-07-12 00:26:15.317 [INFO][4490] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali6048bf267e3 ContainerID="77f1f75d1159c36709fa225bb17fcdabe9a6cef1c6191891758e7b75bef618ee" Namespace="kube-system" Pod="coredns-7c65d6cfc9-rtg8v" WorkloadEndpoint="ip--172--31--26--167-k8s-coredns--7c65d6cfc9--rtg8v-eth0" Jul 12 00:26:15.378113 env[1733]: 2025-07-12 00:26:15.334 [INFO][4490] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="77f1f75d1159c36709fa225bb17fcdabe9a6cef1c6191891758e7b75bef618ee" Namespace="kube-system" Pod="coredns-7c65d6cfc9-rtg8v" WorkloadEndpoint="ip--172--31--26--167-k8s-coredns--7c65d6cfc9--rtg8v-eth0" Jul 12 00:26:15.378113 env[1733]: 2025-07-12 00:26:15.335 [INFO][4490] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="77f1f75d1159c36709fa225bb17fcdabe9a6cef1c6191891758e7b75bef618ee" Namespace="kube-system" Pod="coredns-7c65d6cfc9-rtg8v" WorkloadEndpoint="ip--172--31--26--167-k8s-coredns--7c65d6cfc9--rtg8v-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--167-k8s-coredns--7c65d6cfc9--rtg8v-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"4f42c96b-24be-48e4-ba92-a05f74184848", ResourceVersion:"928", Generation:0, CreationTimestamp:time.Date(2025, time.July, 12, 0, 25, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-167", ContainerID:"77f1f75d1159c36709fa225bb17fcdabe9a6cef1c6191891758e7b75bef618ee", Pod:"coredns-7c65d6cfc9-rtg8v", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.69.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6048bf267e3", MAC:"ce:c3:07:5b:e7:d5", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 12 00:26:15.378113 env[1733]: 2025-07-12 00:26:15.362 [INFO][4490] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="77f1f75d1159c36709fa225bb17fcdabe9a6cef1c6191891758e7b75bef618ee" Namespace="kube-system" Pod="coredns-7c65d6cfc9-rtg8v" WorkloadEndpoint="ip--172--31--26--167-k8s-coredns--7c65d6cfc9--rtg8v-eth0" Jul 12 00:26:15.437000 audit[4598]: NETFILTER_CFG table=filter:106 family=2 entries=46 op=nft_register_chain pid=4598 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 12 00:26:15.439835 systemd-networkd[1459]: caliac7262059b1: Gained IPv6LL Jul 12 00:26:15.437000 audit[4598]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=23740 a0=3 a1=ffffe743eba0 a2=0 a3=ffffb7466fa8 items=0 ppid=4021 pid=4598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:15.437000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 12 00:26:15.470320 systemd[1]: run-netns-cni\x2dfb66c538\x2d82d9\x2dde08\x2dab91\x2d7833ed96d5b4.mount: Deactivated successfully. Jul 12 00:26:15.470503 systemd[1]: run-netns-cni\x2db2bab183\x2d1e7f\x2dcc9d\x2d108c\x2d4e2949158cc4.mount: Deactivated successfully. Jul 12 00:26:15.578703 env[1733]: time="2025-07-12T00:26:15.574569587Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 12 00:26:15.578703 env[1733]: time="2025-07-12T00:26:15.577138221Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 12 00:26:15.578703 env[1733]: time="2025-07-12T00:26:15.577219220Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 12 00:26:15.578703 env[1733]: time="2025-07-12T00:26:15.578567725Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/77f1f75d1159c36709fa225bb17fcdabe9a6cef1c6191891758e7b75bef618ee pid=4608 runtime=io.containerd.runc.v2 Jul 12 00:26:15.674937 systemd[1]: Started cri-containerd-77f1f75d1159c36709fa225bb17fcdabe9a6cef1c6191891758e7b75bef618ee.scope. Jul 12 00:26:15.699414 systemd[1]: run-containerd-runc-k8s.io-77f1f75d1159c36709fa225bb17fcdabe9a6cef1c6191891758e7b75bef618ee-runc.5Johkd.mount: Deactivated successfully. Jul 12 00:26:15.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:15.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:15.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:15.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:15.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:15.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:15.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:15.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:15.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:15.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:15.811000 audit: BPF prog-id=176 op=LOAD Jul 12 00:26:15.813000 audit[4620]: AVC avc: denied { bpf } for pid=4620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:15.813000 audit[4620]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4608 pid=4620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:15.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737663166373564313135396333363730396661323235626231376663 Jul 12 00:26:15.814000 audit[4620]: AVC avc: denied { perfmon } for pid=4620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:15.814000 audit[4620]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4608 pid=4620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:15.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737663166373564313135396333363730396661323235626231376663 Jul 12 00:26:15.814000 audit[4620]: AVC avc: denied { bpf } for pid=4620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:15.814000 audit[4620]: AVC avc: denied { bpf } for pid=4620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:15.814000 audit[4620]: AVC avc: denied { bpf } for pid=4620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:15.814000 audit[4620]: AVC avc: denied { perfmon } for pid=4620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:15.814000 audit[4620]: AVC avc: denied { perfmon } for pid=4620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:15.814000 audit[4620]: AVC avc: denied { perfmon } for pid=4620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:15.814000 audit[4620]: AVC avc: denied { perfmon } for pid=4620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:15.814000 audit[4620]: AVC avc: denied { perfmon } for pid=4620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:15.814000 audit[4620]: AVC avc: denied { bpf } for pid=4620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:15.814000 audit[4620]: AVC avc: denied { bpf } for pid=4620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:15.814000 audit: BPF prog-id=177 op=LOAD Jul 12 00:26:15.814000 audit[4620]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4608 pid=4620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:15.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737663166373564313135396333363730396661323235626231376663 Jul 12 00:26:15.816000 audit[4620]: AVC avc: denied { bpf } for pid=4620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:15.816000 audit[4620]: AVC avc: denied { bpf } for pid=4620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:15.816000 audit[4620]: AVC avc: denied { perfmon } for pid=4620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:15.816000 audit[4620]: AVC avc: denied { perfmon } for pid=4620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:15.816000 audit[4620]: AVC avc: denied { perfmon } for pid=4620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:15.816000 audit[4620]: AVC avc: denied { perfmon } for pid=4620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:15.816000 audit[4620]: AVC avc: denied { perfmon } for pid=4620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:15.816000 audit[4620]: AVC avc: denied { bpf } for pid=4620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:15.816000 audit[4620]: AVC avc: denied { bpf } for pid=4620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:15.816000 audit: BPF prog-id=178 op=LOAD Jul 12 00:26:15.816000 audit[4620]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4608 pid=4620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:15.816000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737663166373564313135396333363730396661323235626231376663 Jul 12 00:26:15.841000 audit: BPF prog-id=178 op=UNLOAD Jul 12 00:26:15.841000 audit: BPF prog-id=177 op=UNLOAD Jul 12 00:26:15.841000 audit[4620]: AVC avc: denied { bpf } for pid=4620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:15.841000 audit[4620]: AVC avc: denied { bpf } for pid=4620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:15.841000 audit[4620]: AVC avc: denied { bpf } for pid=4620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:15.841000 audit[4620]: AVC avc: denied { perfmon } for pid=4620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:15.841000 audit[4620]: AVC avc: denied { perfmon } for pid=4620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:15.841000 audit[4620]: AVC avc: denied { perfmon } for pid=4620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:15.841000 audit[4620]: AVC avc: denied { perfmon } for pid=4620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:15.841000 audit[4620]: AVC avc: denied { perfmon } for pid=4620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:15.841000 audit[4620]: AVC avc: denied { bpf } for pid=4620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:15.841000 audit[4620]: AVC avc: denied { bpf } for pid=4620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:15.841000 audit: BPF prog-id=179 op=LOAD Jul 12 00:26:15.841000 audit[4620]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4608 pid=4620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:15.841000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737663166373564313135396333363730396661323235626231376663 Jul 12 00:26:15.856122 systemd-networkd[1459]: cali9bd5a379afe: Link UP Jul 12 00:26:15.862728 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9bd5a379afe: link becomes ready Jul 12 00:26:15.863057 systemd-networkd[1459]: cali9bd5a379afe: Gained carrier Jul 12 00:26:15.933788 env[1733]: 2025-07-12 00:26:15.228 [INFO][4512] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--26--167-k8s-coredns--7c65d6cfc9--5lbr6-eth0 coredns-7c65d6cfc9- kube-system 17e5c7cc-19eb-4973-833d-c011599b9537 930 0 2025-07-12 00:25:24 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7c65d6cfc9 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-26-167 coredns-7c65d6cfc9-5lbr6 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali9bd5a379afe [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="71a3a644fa323d5bb065a8e4113d70717de829912e50eacada3486e36e39db4b" Namespace="kube-system" Pod="coredns-7c65d6cfc9-5lbr6" WorkloadEndpoint="ip--172--31--26--167-k8s-coredns--7c65d6cfc9--5lbr6-" Jul 12 00:26:15.933788 env[1733]: 2025-07-12 00:26:15.229 [INFO][4512] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="71a3a644fa323d5bb065a8e4113d70717de829912e50eacada3486e36e39db4b" Namespace="kube-system" Pod="coredns-7c65d6cfc9-5lbr6" WorkloadEndpoint="ip--172--31--26--167-k8s-coredns--7c65d6cfc9--5lbr6-eth0" Jul 12 00:26:15.933788 env[1733]: 2025-07-12 00:26:15.490 [INFO][4565] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="71a3a644fa323d5bb065a8e4113d70717de829912e50eacada3486e36e39db4b" HandleID="k8s-pod-network.71a3a644fa323d5bb065a8e4113d70717de829912e50eacada3486e36e39db4b" Workload="ip--172--31--26--167-k8s-coredns--7c65d6cfc9--5lbr6-eth0" Jul 12 00:26:15.933788 env[1733]: 2025-07-12 00:26:15.510 [INFO][4565] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="71a3a644fa323d5bb065a8e4113d70717de829912e50eacada3486e36e39db4b" HandleID="k8s-pod-network.71a3a644fa323d5bb065a8e4113d70717de829912e50eacada3486e36e39db4b" Workload="ip--172--31--26--167-k8s-coredns--7c65d6cfc9--5lbr6-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002b54a0), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-26-167", "pod":"coredns-7c65d6cfc9-5lbr6", "timestamp":"2025-07-12 00:26:15.490726733 +0000 UTC"}, Hostname:"ip-172-31-26-167", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 12 00:26:15.933788 env[1733]: 2025-07-12 00:26:15.510 [INFO][4565] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 12 00:26:15.933788 env[1733]: 2025-07-12 00:26:15.510 [INFO][4565] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 12 00:26:15.933788 env[1733]: 2025-07-12 00:26:15.511 [INFO][4565] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-26-167' Jul 12 00:26:15.933788 env[1733]: 2025-07-12 00:26:15.572 [INFO][4565] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.71a3a644fa323d5bb065a8e4113d70717de829912e50eacada3486e36e39db4b" host="ip-172-31-26-167" Jul 12 00:26:15.933788 env[1733]: 2025-07-12 00:26:15.639 [INFO][4565] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-26-167" Jul 12 00:26:15.933788 env[1733]: 2025-07-12 00:26:15.714 [INFO][4565] ipam/ipam.go 511: Trying affinity for 192.168.69.192/26 host="ip-172-31-26-167" Jul 12 00:26:15.933788 env[1733]: 2025-07-12 00:26:15.737 [INFO][4565] ipam/ipam.go 158: Attempting to load block cidr=192.168.69.192/26 host="ip-172-31-26-167" Jul 12 00:26:15.933788 env[1733]: 2025-07-12 00:26:15.743 [INFO][4565] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.69.192/26 host="ip-172-31-26-167" Jul 12 00:26:15.933788 env[1733]: 2025-07-12 00:26:15.743 [INFO][4565] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.69.192/26 handle="k8s-pod-network.71a3a644fa323d5bb065a8e4113d70717de829912e50eacada3486e36e39db4b" host="ip-172-31-26-167" Jul 12 00:26:15.933788 env[1733]: 2025-07-12 00:26:15.755 [INFO][4565] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.71a3a644fa323d5bb065a8e4113d70717de829912e50eacada3486e36e39db4b Jul 12 00:26:15.933788 env[1733]: 2025-07-12 00:26:15.787 [INFO][4565] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.69.192/26 handle="k8s-pod-network.71a3a644fa323d5bb065a8e4113d70717de829912e50eacada3486e36e39db4b" host="ip-172-31-26-167" Jul 12 00:26:15.933788 env[1733]: 2025-07-12 00:26:15.809 [INFO][4565] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.69.196/26] block=192.168.69.192/26 handle="k8s-pod-network.71a3a644fa323d5bb065a8e4113d70717de829912e50eacada3486e36e39db4b" host="ip-172-31-26-167" Jul 12 00:26:15.933788 env[1733]: 2025-07-12 00:26:15.810 [INFO][4565] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.69.196/26] handle="k8s-pod-network.71a3a644fa323d5bb065a8e4113d70717de829912e50eacada3486e36e39db4b" host="ip-172-31-26-167" Jul 12 00:26:15.933788 env[1733]: 2025-07-12 00:26:15.810 [INFO][4565] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 12 00:26:15.933788 env[1733]: 2025-07-12 00:26:15.810 [INFO][4565] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.69.196/26] IPv6=[] ContainerID="71a3a644fa323d5bb065a8e4113d70717de829912e50eacada3486e36e39db4b" HandleID="k8s-pod-network.71a3a644fa323d5bb065a8e4113d70717de829912e50eacada3486e36e39db4b" Workload="ip--172--31--26--167-k8s-coredns--7c65d6cfc9--5lbr6-eth0" Jul 12 00:26:15.935454 env[1733]: 2025-07-12 00:26:15.836 [INFO][4512] cni-plugin/k8s.go 418: Populated endpoint ContainerID="71a3a644fa323d5bb065a8e4113d70717de829912e50eacada3486e36e39db4b" Namespace="kube-system" Pod="coredns-7c65d6cfc9-5lbr6" WorkloadEndpoint="ip--172--31--26--167-k8s-coredns--7c65d6cfc9--5lbr6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--167-k8s-coredns--7c65d6cfc9--5lbr6-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"17e5c7cc-19eb-4973-833d-c011599b9537", ResourceVersion:"930", Generation:0, CreationTimestamp:time.Date(2025, time.July, 12, 0, 25, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-167", ContainerID:"", Pod:"coredns-7c65d6cfc9-5lbr6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.69.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9bd5a379afe", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 12 00:26:15.935454 env[1733]: 2025-07-12 00:26:15.836 [INFO][4512] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.69.196/32] ContainerID="71a3a644fa323d5bb065a8e4113d70717de829912e50eacada3486e36e39db4b" Namespace="kube-system" Pod="coredns-7c65d6cfc9-5lbr6" WorkloadEndpoint="ip--172--31--26--167-k8s-coredns--7c65d6cfc9--5lbr6-eth0" Jul 12 00:26:15.935454 env[1733]: 2025-07-12 00:26:15.836 [INFO][4512] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali9bd5a379afe ContainerID="71a3a644fa323d5bb065a8e4113d70717de829912e50eacada3486e36e39db4b" Namespace="kube-system" Pod="coredns-7c65d6cfc9-5lbr6" WorkloadEndpoint="ip--172--31--26--167-k8s-coredns--7c65d6cfc9--5lbr6-eth0" Jul 12 00:26:15.935454 env[1733]: 2025-07-12 00:26:15.876 [INFO][4512] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="71a3a644fa323d5bb065a8e4113d70717de829912e50eacada3486e36e39db4b" Namespace="kube-system" Pod="coredns-7c65d6cfc9-5lbr6" WorkloadEndpoint="ip--172--31--26--167-k8s-coredns--7c65d6cfc9--5lbr6-eth0" Jul 12 00:26:15.935454 env[1733]: 2025-07-12 00:26:15.878 [INFO][4512] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="71a3a644fa323d5bb065a8e4113d70717de829912e50eacada3486e36e39db4b" Namespace="kube-system" Pod="coredns-7c65d6cfc9-5lbr6" WorkloadEndpoint="ip--172--31--26--167-k8s-coredns--7c65d6cfc9--5lbr6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--167-k8s-coredns--7c65d6cfc9--5lbr6-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"17e5c7cc-19eb-4973-833d-c011599b9537", ResourceVersion:"930", Generation:0, CreationTimestamp:time.Date(2025, time.July, 12, 0, 25, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-167", ContainerID:"71a3a644fa323d5bb065a8e4113d70717de829912e50eacada3486e36e39db4b", Pod:"coredns-7c65d6cfc9-5lbr6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.69.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9bd5a379afe", MAC:"7e:06:28:fd:0b:ec", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 12 00:26:15.935454 env[1733]: 2025-07-12 00:26:15.920 [INFO][4512] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="71a3a644fa323d5bb065a8e4113d70717de829912e50eacada3486e36e39db4b" Namespace="kube-system" Pod="coredns-7c65d6cfc9-5lbr6" WorkloadEndpoint="ip--172--31--26--167-k8s-coredns--7c65d6cfc9--5lbr6-eth0" Jul 12 00:26:15.985481 env[1733]: time="2025-07-12T00:26:15.985267502Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-rtg8v,Uid:4f42c96b-24be-48e4-ba92-a05f74184848,Namespace:kube-system,Attempt:1,} returns sandbox id \"77f1f75d1159c36709fa225bb17fcdabe9a6cef1c6191891758e7b75bef618ee\"" Jul 12 00:26:16.000926 systemd-networkd[1459]: cali186ed149bf2: Link UP Jul 12 00:26:16.002558 env[1733]: time="2025-07-12T00:26:16.002476853Z" level=info msg="CreateContainer within sandbox \"77f1f75d1159c36709fa225bb17fcdabe9a6cef1c6191891758e7b75bef618ee\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Jul 12 00:26:16.008000 audit[4668]: NETFILTER_CFG table=filter:107 family=2 entries=40 op=nft_register_chain pid=4668 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 12 00:26:16.008000 audit[4668]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20344 a0=3 a1=ffffeca28020 a2=0 a3=ffff96528fa8 items=0 ppid=4021 pid=4668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:16.008000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 12 00:26:16.013771 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali186ed149bf2: link becomes ready Jul 12 00:26:16.013898 systemd-networkd[1459]: cali186ed149bf2: Gained carrier Jul 12 00:26:16.058088 env[1733]: time="2025-07-12T00:26:16.057959348Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 12 00:26:16.058284 env[1733]: time="2025-07-12T00:26:16.058125775Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 12 00:26:16.058284 env[1733]: time="2025-07-12T00:26:16.058230391Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 12 00:26:16.071210 env[1733]: 2025-07-12 00:26:15.211 [INFO][4526] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--26--167-k8s-goldmane--58fd7646b9--rmlz5-eth0 goldmane-58fd7646b9- calico-system 1de9e718-b4cc-4c55-aca5-2a9b50b71c00 929 0 2025-07-12 00:25:48 +0000 UTC map[app.kubernetes.io/name:goldmane k8s-app:goldmane pod-template-hash:58fd7646b9 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:goldmane] map[] [] [] []} {k8s ip-172-31-26-167 goldmane-58fd7646b9-rmlz5 eth0 goldmane [] [] [kns.calico-system ksa.calico-system.goldmane] cali186ed149bf2 [] [] }} ContainerID="51262c9ac632bb37d5bb70bebe6ec597ad86ed7fa070d532cfa587c8f7cf7b13" Namespace="calico-system" Pod="goldmane-58fd7646b9-rmlz5" WorkloadEndpoint="ip--172--31--26--167-k8s-goldmane--58fd7646b9--rmlz5-" Jul 12 00:26:16.071210 env[1733]: 2025-07-12 00:26:15.211 [INFO][4526] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="51262c9ac632bb37d5bb70bebe6ec597ad86ed7fa070d532cfa587c8f7cf7b13" Namespace="calico-system" Pod="goldmane-58fd7646b9-rmlz5" WorkloadEndpoint="ip--172--31--26--167-k8s-goldmane--58fd7646b9--rmlz5-eth0" Jul 12 00:26:16.071210 env[1733]: 2025-07-12 00:26:15.605 [INFO][4574] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="51262c9ac632bb37d5bb70bebe6ec597ad86ed7fa070d532cfa587c8f7cf7b13" HandleID="k8s-pod-network.51262c9ac632bb37d5bb70bebe6ec597ad86ed7fa070d532cfa587c8f7cf7b13" Workload="ip--172--31--26--167-k8s-goldmane--58fd7646b9--rmlz5-eth0" Jul 12 00:26:16.071210 env[1733]: 2025-07-12 00:26:15.605 [INFO][4574] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="51262c9ac632bb37d5bb70bebe6ec597ad86ed7fa070d532cfa587c8f7cf7b13" HandleID="k8s-pod-network.51262c9ac632bb37d5bb70bebe6ec597ad86ed7fa070d532cfa587c8f7cf7b13" Workload="ip--172--31--26--167-k8s-goldmane--58fd7646b9--rmlz5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002667b0), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-26-167", "pod":"goldmane-58fd7646b9-rmlz5", "timestamp":"2025-07-12 00:26:15.605135835 +0000 UTC"}, Hostname:"ip-172-31-26-167", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 12 00:26:16.071210 env[1733]: 2025-07-12 00:26:15.606 [INFO][4574] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 12 00:26:16.071210 env[1733]: 2025-07-12 00:26:15.810 [INFO][4574] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 12 00:26:16.071210 env[1733]: 2025-07-12 00:26:15.811 [INFO][4574] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-26-167' Jul 12 00:26:16.071210 env[1733]: 2025-07-12 00:26:15.855 [INFO][4574] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.51262c9ac632bb37d5bb70bebe6ec597ad86ed7fa070d532cfa587c8f7cf7b13" host="ip-172-31-26-167" Jul 12 00:26:16.071210 env[1733]: 2025-07-12 00:26:15.893 [INFO][4574] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-26-167" Jul 12 00:26:16.071210 env[1733]: 2025-07-12 00:26:15.906 [INFO][4574] ipam/ipam.go 511: Trying affinity for 192.168.69.192/26 host="ip-172-31-26-167" Jul 12 00:26:16.071210 env[1733]: 2025-07-12 00:26:15.910 [INFO][4574] ipam/ipam.go 158: Attempting to load block cidr=192.168.69.192/26 host="ip-172-31-26-167" Jul 12 00:26:16.071210 env[1733]: 2025-07-12 00:26:15.925 [INFO][4574] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.69.192/26 host="ip-172-31-26-167" Jul 12 00:26:16.071210 env[1733]: 2025-07-12 00:26:15.925 [INFO][4574] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.69.192/26 handle="k8s-pod-network.51262c9ac632bb37d5bb70bebe6ec597ad86ed7fa070d532cfa587c8f7cf7b13" host="ip-172-31-26-167" Jul 12 00:26:16.071210 env[1733]: 2025-07-12 00:26:15.929 [INFO][4574] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.51262c9ac632bb37d5bb70bebe6ec597ad86ed7fa070d532cfa587c8f7cf7b13 Jul 12 00:26:16.071210 env[1733]: 2025-07-12 00:26:15.947 [INFO][4574] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.69.192/26 handle="k8s-pod-network.51262c9ac632bb37d5bb70bebe6ec597ad86ed7fa070d532cfa587c8f7cf7b13" host="ip-172-31-26-167" Jul 12 00:26:16.071210 env[1733]: 2025-07-12 00:26:15.970 [INFO][4574] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.69.197/26] block=192.168.69.192/26 handle="k8s-pod-network.51262c9ac632bb37d5bb70bebe6ec597ad86ed7fa070d532cfa587c8f7cf7b13" host="ip-172-31-26-167" Jul 12 00:26:16.071210 env[1733]: 2025-07-12 00:26:15.970 [INFO][4574] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.69.197/26] handle="k8s-pod-network.51262c9ac632bb37d5bb70bebe6ec597ad86ed7fa070d532cfa587c8f7cf7b13" host="ip-172-31-26-167" Jul 12 00:26:16.071210 env[1733]: 2025-07-12 00:26:15.970 [INFO][4574] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 12 00:26:16.071210 env[1733]: 2025-07-12 00:26:15.971 [INFO][4574] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.69.197/26] IPv6=[] ContainerID="51262c9ac632bb37d5bb70bebe6ec597ad86ed7fa070d532cfa587c8f7cf7b13" HandleID="k8s-pod-network.51262c9ac632bb37d5bb70bebe6ec597ad86ed7fa070d532cfa587c8f7cf7b13" Workload="ip--172--31--26--167-k8s-goldmane--58fd7646b9--rmlz5-eth0" Jul 12 00:26:16.073874 env[1733]: 2025-07-12 00:26:15.977 [INFO][4526] cni-plugin/k8s.go 418: Populated endpoint ContainerID="51262c9ac632bb37d5bb70bebe6ec597ad86ed7fa070d532cfa587c8f7cf7b13" Namespace="calico-system" Pod="goldmane-58fd7646b9-rmlz5" WorkloadEndpoint="ip--172--31--26--167-k8s-goldmane--58fd7646b9--rmlz5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--167-k8s-goldmane--58fd7646b9--rmlz5-eth0", GenerateName:"goldmane-58fd7646b9-", Namespace:"calico-system", SelfLink:"", UID:"1de9e718-b4cc-4c55-aca5-2a9b50b71c00", ResourceVersion:"929", Generation:0, CreationTimestamp:time.Date(2025, time.July, 12, 0, 25, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"58fd7646b9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-167", ContainerID:"", Pod:"goldmane-58fd7646b9-rmlz5", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.69.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali186ed149bf2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 12 00:26:16.073874 env[1733]: 2025-07-12 00:26:15.978 [INFO][4526] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.69.197/32] ContainerID="51262c9ac632bb37d5bb70bebe6ec597ad86ed7fa070d532cfa587c8f7cf7b13" Namespace="calico-system" Pod="goldmane-58fd7646b9-rmlz5" WorkloadEndpoint="ip--172--31--26--167-k8s-goldmane--58fd7646b9--rmlz5-eth0" Jul 12 00:26:16.073874 env[1733]: 2025-07-12 00:26:15.978 [INFO][4526] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali186ed149bf2 ContainerID="51262c9ac632bb37d5bb70bebe6ec597ad86ed7fa070d532cfa587c8f7cf7b13" Namespace="calico-system" Pod="goldmane-58fd7646b9-rmlz5" WorkloadEndpoint="ip--172--31--26--167-k8s-goldmane--58fd7646b9--rmlz5-eth0" Jul 12 00:26:16.073874 env[1733]: 2025-07-12 00:26:16.016 [INFO][4526] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="51262c9ac632bb37d5bb70bebe6ec597ad86ed7fa070d532cfa587c8f7cf7b13" Namespace="calico-system" Pod="goldmane-58fd7646b9-rmlz5" WorkloadEndpoint="ip--172--31--26--167-k8s-goldmane--58fd7646b9--rmlz5-eth0" Jul 12 00:26:16.073874 env[1733]: 2025-07-12 00:26:16.026 [INFO][4526] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="51262c9ac632bb37d5bb70bebe6ec597ad86ed7fa070d532cfa587c8f7cf7b13" Namespace="calico-system" Pod="goldmane-58fd7646b9-rmlz5" WorkloadEndpoint="ip--172--31--26--167-k8s-goldmane--58fd7646b9--rmlz5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--167-k8s-goldmane--58fd7646b9--rmlz5-eth0", GenerateName:"goldmane-58fd7646b9-", Namespace:"calico-system", SelfLink:"", UID:"1de9e718-b4cc-4c55-aca5-2a9b50b71c00", ResourceVersion:"929", Generation:0, CreationTimestamp:time.Date(2025, time.July, 12, 0, 25, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"58fd7646b9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-167", ContainerID:"51262c9ac632bb37d5bb70bebe6ec597ad86ed7fa070d532cfa587c8f7cf7b13", Pod:"goldmane-58fd7646b9-rmlz5", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.69.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali186ed149bf2", MAC:"b2:ae:43:be:4f:54", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 12 00:26:16.073874 env[1733]: 2025-07-12 00:26:16.062 [INFO][4526] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="51262c9ac632bb37d5bb70bebe6ec597ad86ed7fa070d532cfa587c8f7cf7b13" Namespace="calico-system" Pod="goldmane-58fd7646b9-rmlz5" WorkloadEndpoint="ip--172--31--26--167-k8s-goldmane--58fd7646b9--rmlz5-eth0" Jul 12 00:26:16.073874 env[1733]: time="2025-07-12T00:26:16.072522327Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/71a3a644fa323d5bb065a8e4113d70717de829912e50eacada3486e36e39db4b pid=4671 runtime=io.containerd.runc.v2 Jul 12 00:26:16.074619 env[1733]: time="2025-07-12T00:26:16.074542616Z" level=info msg="CreateContainer within sandbox \"77f1f75d1159c36709fa225bb17fcdabe9a6cef1c6191891758e7b75bef618ee\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"4aca753e191eb38bf6b0bd1927b788db950291058a5efd0ff3d7a31135e2b617\"" Jul 12 00:26:16.076856 env[1733]: time="2025-07-12T00:26:16.075814275Z" level=info msg="StartContainer for \"4aca753e191eb38bf6b0bd1927b788db950291058a5efd0ff3d7a31135e2b617\"" Jul 12 00:26:16.121125 env[1733]: time="2025-07-12T00:26:16.119394481Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 12 00:26:16.121125 env[1733]: time="2025-07-12T00:26:16.119563633Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 12 00:26:16.121125 env[1733]: time="2025-07-12T00:26:16.119628084Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 12 00:26:16.121125 env[1733]: time="2025-07-12T00:26:16.119999183Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/51262c9ac632bb37d5bb70bebe6ec597ad86ed7fa070d532cfa587c8f7cf7b13 pid=4704 runtime=io.containerd.runc.v2 Jul 12 00:26:16.185671 env[1733]: time="2025-07-12T00:26:16.182329117Z" level=info msg="StopPodSandbox for \"0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7\"" Jul 12 00:26:16.207033 systemd[1]: Started cri-containerd-4aca753e191eb38bf6b0bd1927b788db950291058a5efd0ff3d7a31135e2b617.scope. Jul 12 00:26:16.210575 systemd-networkd[1459]: cali383ea7bdef1: Link UP Jul 12 00:26:16.230443 systemd-networkd[1459]: cali383ea7bdef1: Gained carrier Jul 12 00:26:16.230848 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali383ea7bdef1: link becomes ready Jul 12 00:26:16.249938 env[1733]: 2025-07-12 00:26:15.754 [INFO][4566] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b" Jul 12 00:26:16.249938 env[1733]: 2025-07-12 00:26:15.754 [INFO][4566] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b" iface="eth0" netns="/var/run/netns/cni-2d5183f2-271f-f772-bca9-ca48977331fd" Jul 12 00:26:16.249938 env[1733]: 2025-07-12 00:26:15.754 [INFO][4566] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b" iface="eth0" netns="/var/run/netns/cni-2d5183f2-271f-f772-bca9-ca48977331fd" Jul 12 00:26:16.249938 env[1733]: 2025-07-12 00:26:15.755 [INFO][4566] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b" iface="eth0" netns="/var/run/netns/cni-2d5183f2-271f-f772-bca9-ca48977331fd" Jul 12 00:26:16.249938 env[1733]: 2025-07-12 00:26:15.755 [INFO][4566] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b" Jul 12 00:26:16.249938 env[1733]: 2025-07-12 00:26:15.755 [INFO][4566] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b" Jul 12 00:26:16.249938 env[1733]: 2025-07-12 00:26:15.907 [INFO][4632] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b" HandleID="k8s-pod-network.6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b" Workload="ip--172--31--26--167-k8s-calico--kube--controllers--5c48f86fdd--72x89-eth0" Jul 12 00:26:16.249938 env[1733]: 2025-07-12 00:26:15.907 [INFO][4632] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 12 00:26:16.249938 env[1733]: 2025-07-12 00:26:16.167 [INFO][4632] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 12 00:26:16.249938 env[1733]: 2025-07-12 00:26:16.223 [WARNING][4632] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b" HandleID="k8s-pod-network.6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b" Workload="ip--172--31--26--167-k8s-calico--kube--controllers--5c48f86fdd--72x89-eth0" Jul 12 00:26:16.249938 env[1733]: 2025-07-12 00:26:16.223 [INFO][4632] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b" HandleID="k8s-pod-network.6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b" Workload="ip--172--31--26--167-k8s-calico--kube--controllers--5c48f86fdd--72x89-eth0" Jul 12 00:26:16.249938 env[1733]: 2025-07-12 00:26:16.229 [INFO][4632] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 12 00:26:16.249938 env[1733]: 2025-07-12 00:26:16.234 [INFO][4566] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b" Jul 12 00:26:16.252696 env[1733]: time="2025-07-12T00:26:16.252624202Z" level=info msg="TearDown network for sandbox \"6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b\" successfully" Jul 12 00:26:16.252866 env[1733]: time="2025-07-12T00:26:16.252828681Z" level=info msg="StopPodSandbox for \"6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b\" returns successfully" Jul 12 00:26:16.254060 env[1733]: time="2025-07-12T00:26:16.253991249Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5c48f86fdd-72x89,Uid:7c6c2194-2c72-4a54-9fb8-bf2e357a0987,Namespace:calico-system,Attempt:1,}" Jul 12 00:26:16.270145 systemd[1]: Started cri-containerd-71a3a644fa323d5bb065a8e4113d70717de829912e50eacada3486e36e39db4b.scope. Jul 12 00:26:16.302620 systemd[1]: Started cri-containerd-51262c9ac632bb37d5bb70bebe6ec597ad86ed7fa070d532cfa587c8f7cf7b13.scope. Jul 12 00:26:16.312227 env[1733]: 2025-07-12 00:26:15.288 [INFO][4537] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--kx5cn-eth0 calico-apiserver-b5644b9bf- calico-apiserver e3812f81-11a9-4dfb-a0f5-cf6c3ca45a4d 931 0 2025-07-12 00:25:40 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:b5644b9bf projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-26-167 calico-apiserver-b5644b9bf-kx5cn eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali383ea7bdef1 [] [] }} ContainerID="bc2545c9dcd60547a2ee8cc577172be3bee080d7a2f340c748a8ca6028d558a9" Namespace="calico-apiserver" Pod="calico-apiserver-b5644b9bf-kx5cn" WorkloadEndpoint="ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--kx5cn-" Jul 12 00:26:16.312227 env[1733]: 2025-07-12 00:26:15.288 [INFO][4537] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="bc2545c9dcd60547a2ee8cc577172be3bee080d7a2f340c748a8ca6028d558a9" Namespace="calico-apiserver" Pod="calico-apiserver-b5644b9bf-kx5cn" WorkloadEndpoint="ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--kx5cn-eth0" Jul 12 00:26:16.312227 env[1733]: 2025-07-12 00:26:15.726 [INFO][4581] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="bc2545c9dcd60547a2ee8cc577172be3bee080d7a2f340c748a8ca6028d558a9" HandleID="k8s-pod-network.bc2545c9dcd60547a2ee8cc577172be3bee080d7a2f340c748a8ca6028d558a9" Workload="ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--kx5cn-eth0" Jul 12 00:26:16.312227 env[1733]: 2025-07-12 00:26:15.726 [INFO][4581] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="bc2545c9dcd60547a2ee8cc577172be3bee080d7a2f340c748a8ca6028d558a9" HandleID="k8s-pod-network.bc2545c9dcd60547a2ee8cc577172be3bee080d7a2f340c748a8ca6028d558a9" Workload="ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--kx5cn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d3ac0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-26-167", "pod":"calico-apiserver-b5644b9bf-kx5cn", "timestamp":"2025-07-12 00:26:15.726564899 +0000 UTC"}, Hostname:"ip-172-31-26-167", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 12 00:26:16.312227 env[1733]: 2025-07-12 00:26:15.727 [INFO][4581] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 12 00:26:16.312227 env[1733]: 2025-07-12 00:26:15.971 [INFO][4581] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 12 00:26:16.312227 env[1733]: 2025-07-12 00:26:15.971 [INFO][4581] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-26-167' Jul 12 00:26:16.312227 env[1733]: 2025-07-12 00:26:16.034 [INFO][4581] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.bc2545c9dcd60547a2ee8cc577172be3bee080d7a2f340c748a8ca6028d558a9" host="ip-172-31-26-167" Jul 12 00:26:16.312227 env[1733]: 2025-07-12 00:26:16.062 [INFO][4581] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-26-167" Jul 12 00:26:16.312227 env[1733]: 2025-07-12 00:26:16.099 [INFO][4581] ipam/ipam.go 511: Trying affinity for 192.168.69.192/26 host="ip-172-31-26-167" Jul 12 00:26:16.312227 env[1733]: 2025-07-12 00:26:16.111 [INFO][4581] ipam/ipam.go 158: Attempting to load block cidr=192.168.69.192/26 host="ip-172-31-26-167" Jul 12 00:26:16.312227 env[1733]: 2025-07-12 00:26:16.116 [INFO][4581] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.69.192/26 host="ip-172-31-26-167" Jul 12 00:26:16.312227 env[1733]: 2025-07-12 00:26:16.116 [INFO][4581] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.69.192/26 handle="k8s-pod-network.bc2545c9dcd60547a2ee8cc577172be3bee080d7a2f340c748a8ca6028d558a9" host="ip-172-31-26-167" Jul 12 00:26:16.312227 env[1733]: 2025-07-12 00:26:16.121 [INFO][4581] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.bc2545c9dcd60547a2ee8cc577172be3bee080d7a2f340c748a8ca6028d558a9 Jul 12 00:26:16.312227 env[1733]: 2025-07-12 00:26:16.136 [INFO][4581] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.69.192/26 handle="k8s-pod-network.bc2545c9dcd60547a2ee8cc577172be3bee080d7a2f340c748a8ca6028d558a9" host="ip-172-31-26-167" Jul 12 00:26:16.312227 env[1733]: 2025-07-12 00:26:16.165 [INFO][4581] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.69.198/26] block=192.168.69.192/26 handle="k8s-pod-network.bc2545c9dcd60547a2ee8cc577172be3bee080d7a2f340c748a8ca6028d558a9" host="ip-172-31-26-167" Jul 12 00:26:16.312227 env[1733]: 2025-07-12 00:26:16.165 [INFO][4581] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.69.198/26] handle="k8s-pod-network.bc2545c9dcd60547a2ee8cc577172be3bee080d7a2f340c748a8ca6028d558a9" host="ip-172-31-26-167" Jul 12 00:26:16.312227 env[1733]: 2025-07-12 00:26:16.165 [INFO][4581] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 12 00:26:16.312227 env[1733]: 2025-07-12 00:26:16.165 [INFO][4581] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.69.198/26] IPv6=[] ContainerID="bc2545c9dcd60547a2ee8cc577172be3bee080d7a2f340c748a8ca6028d558a9" HandleID="k8s-pod-network.bc2545c9dcd60547a2ee8cc577172be3bee080d7a2f340c748a8ca6028d558a9" Workload="ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--kx5cn-eth0" Jul 12 00:26:16.314802 env[1733]: 2025-07-12 00:26:16.172 [INFO][4537] cni-plugin/k8s.go 418: Populated endpoint ContainerID="bc2545c9dcd60547a2ee8cc577172be3bee080d7a2f340c748a8ca6028d558a9" Namespace="calico-apiserver" Pod="calico-apiserver-b5644b9bf-kx5cn" WorkloadEndpoint="ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--kx5cn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--kx5cn-eth0", GenerateName:"calico-apiserver-b5644b9bf-", Namespace:"calico-apiserver", SelfLink:"", UID:"e3812f81-11a9-4dfb-a0f5-cf6c3ca45a4d", ResourceVersion:"931", Generation:0, CreationTimestamp:time.Date(2025, time.July, 12, 0, 25, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"b5644b9bf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-167", ContainerID:"", Pod:"calico-apiserver-b5644b9bf-kx5cn", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.69.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali383ea7bdef1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 12 00:26:16.314802 env[1733]: 2025-07-12 00:26:16.173 [INFO][4537] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.69.198/32] ContainerID="bc2545c9dcd60547a2ee8cc577172be3bee080d7a2f340c748a8ca6028d558a9" Namespace="calico-apiserver" Pod="calico-apiserver-b5644b9bf-kx5cn" WorkloadEndpoint="ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--kx5cn-eth0" Jul 12 00:26:16.314802 env[1733]: 2025-07-12 00:26:16.173 [INFO][4537] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali383ea7bdef1 ContainerID="bc2545c9dcd60547a2ee8cc577172be3bee080d7a2f340c748a8ca6028d558a9" Namespace="calico-apiserver" Pod="calico-apiserver-b5644b9bf-kx5cn" WorkloadEndpoint="ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--kx5cn-eth0" Jul 12 00:26:16.314802 env[1733]: 2025-07-12 00:26:16.236 [INFO][4537] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="bc2545c9dcd60547a2ee8cc577172be3bee080d7a2f340c748a8ca6028d558a9" Namespace="calico-apiserver" Pod="calico-apiserver-b5644b9bf-kx5cn" WorkloadEndpoint="ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--kx5cn-eth0" Jul 12 00:26:16.314802 env[1733]: 2025-07-12 00:26:16.239 [INFO][4537] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="bc2545c9dcd60547a2ee8cc577172be3bee080d7a2f340c748a8ca6028d558a9" Namespace="calico-apiserver" Pod="calico-apiserver-b5644b9bf-kx5cn" WorkloadEndpoint="ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--kx5cn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--kx5cn-eth0", GenerateName:"calico-apiserver-b5644b9bf-", Namespace:"calico-apiserver", SelfLink:"", UID:"e3812f81-11a9-4dfb-a0f5-cf6c3ca45a4d", ResourceVersion:"931", Generation:0, CreationTimestamp:time.Date(2025, time.July, 12, 0, 25, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"b5644b9bf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-167", ContainerID:"bc2545c9dcd60547a2ee8cc577172be3bee080d7a2f340c748a8ca6028d558a9", Pod:"calico-apiserver-b5644b9bf-kx5cn", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.69.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali383ea7bdef1", MAC:"de:7e:3c:69:3e:17", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 12 00:26:16.314802 env[1733]: 2025-07-12 00:26:16.275 [INFO][4537] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="bc2545c9dcd60547a2ee8cc577172be3bee080d7a2f340c748a8ca6028d558a9" Namespace="calico-apiserver" Pod="calico-apiserver-b5644b9bf-kx5cn" WorkloadEndpoint="ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--kx5cn-eth0" Jul 12 00:26:16.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.339000 audit: BPF prog-id=180 op=LOAD Jul 12 00:26:16.341000 audit[4706]: AVC avc: denied { bpf } for pid=4706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.341000 audit[4706]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=4608 pid=4706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:16.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461636137353365313931656233386266366230626431393237623738 Jul 12 00:26:16.345000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.345000 audit[4706]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=4608 pid=4706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:16.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461636137353365313931656233386266366230626431393237623738 Jul 12 00:26:16.345000 audit[4706]: AVC avc: denied { bpf } for pid=4706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.345000 audit[4706]: AVC avc: denied { bpf } for pid=4706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.345000 audit[4706]: AVC avc: denied { bpf } for pid=4706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.345000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.345000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.345000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.345000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.345000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.345000 audit[4706]: AVC avc: denied { bpf } for pid=4706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.345000 audit[4706]: AVC avc: denied { bpf } for pid=4706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.345000 audit: BPF prog-id=181 op=LOAD Jul 12 00:26:16.345000 audit[4706]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=4608 pid=4706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:16.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461636137353365313931656233386266366230626431393237623738 Jul 12 00:26:16.352000 audit[4706]: AVC avc: denied { bpf } for pid=4706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.352000 audit[4706]: AVC avc: denied { bpf } for pid=4706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.352000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.352000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.352000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.352000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.352000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.352000 audit[4706]: AVC avc: denied { bpf } for pid=4706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.352000 audit[4706]: AVC avc: denied { bpf } for pid=4706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.352000 audit: BPF prog-id=182 op=LOAD Jul 12 00:26:16.352000 audit[4706]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=4608 pid=4706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:16.352000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461636137353365313931656233386266366230626431393237623738 Jul 12 00:26:16.353000 audit: BPF prog-id=182 op=UNLOAD Jul 12 00:26:16.353000 audit: BPF prog-id=181 op=UNLOAD Jul 12 00:26:16.354000 audit[4706]: AVC avc: denied { bpf } for pid=4706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.354000 audit[4706]: AVC avc: denied { bpf } for pid=4706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.354000 audit[4706]: AVC avc: denied { bpf } for pid=4706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.354000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.354000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.354000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.354000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.354000 audit[4706]: AVC avc: denied { perfmon } for pid=4706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.354000 audit[4706]: AVC avc: denied { bpf } for pid=4706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.354000 audit[4706]: AVC avc: denied { bpf } for pid=4706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.354000 audit: BPF prog-id=183 op=LOAD Jul 12 00:26:16.354000 audit[4706]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=4608 pid=4706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:16.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461636137353365313931656233386266366230626431393237623738 Jul 12 00:26:16.411718 env[1733]: time="2025-07-12T00:26:16.408263734Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 12 00:26:16.411718 env[1733]: time="2025-07-12T00:26:16.408443673Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 12 00:26:16.411718 env[1733]: time="2025-07-12T00:26:16.408541053Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 12 00:26:16.411718 env[1733]: time="2025-07-12T00:26:16.410079591Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bc2545c9dcd60547a2ee8cc577172be3bee080d7a2f340c748a8ca6028d558a9 pid=4796 runtime=io.containerd.runc.v2 Jul 12 00:26:16.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.415000 audit: BPF prog-id=184 op=LOAD Jul 12 00:26:16.417000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.417000 audit[4685]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4671 pid=4685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:16.417000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731613361363434666133323364356262303635613865343131336437 Jul 12 00:26:16.418000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.418000 audit[4685]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4671 pid=4685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:16.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731613361363434666133323364356262303635613865343131336437 Jul 12 00:26:16.418000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.418000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.418000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.418000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.418000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.418000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.418000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.418000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.418000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.418000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.418000 audit: BPF prog-id=185 op=LOAD Jul 12 00:26:16.418000 audit[4685]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4671 pid=4685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:16.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731613361363434666133323364356262303635613865343131336437 Jul 12 00:26:16.420000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.420000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.420000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.420000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.420000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.420000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.420000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.420000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.420000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.420000 audit: BPF prog-id=186 op=LOAD Jul 12 00:26:16.420000 audit[4685]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4671 pid=4685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:16.420000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731613361363434666133323364356262303635613865343131336437 Jul 12 00:26:16.425000 audit: BPF prog-id=186 op=UNLOAD Jul 12 00:26:16.425000 audit: BPF prog-id=185 op=UNLOAD Jul 12 00:26:16.425000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.425000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.425000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.425000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.425000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.425000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.425000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.425000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.425000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.425000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.425000 audit: BPF prog-id=187 op=LOAD Jul 12 00:26:16.425000 audit[4685]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4671 pid=4685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:16.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731613361363434666133323364356262303635613865343131336437 Jul 12 00:26:16.470378 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3774069971.mount: Deactivated successfully. Jul 12 00:26:16.470571 systemd[1]: run-netns-cni\x2d2d5183f2\x2d271f\x2df772\x2dbca9\x2dca48977331fd.mount: Deactivated successfully. Jul 12 00:26:16.527458 systemd-networkd[1459]: cali6048bf267e3: Gained IPv6LL Jul 12 00:26:16.578000 audit[4759]: NETFILTER_CFG table=filter:108 family=2 entries=56 op=nft_register_chain pid=4759 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 12 00:26:16.578000 audit[4759]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=28744 a0=3 a1=ffffe5581c90 a2=0 a3=ffffa2ebbfa8 items=0 ppid=4021 pid=4759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:16.578000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 12 00:26:16.593507 systemd[1]: Started cri-containerd-bc2545c9dcd60547a2ee8cc577172be3bee080d7a2f340c748a8ca6028d558a9.scope. Jul 12 00:26:16.615374 env[1733]: time="2025-07-12T00:26:16.615281331Z" level=info msg="StartContainer for \"4aca753e191eb38bf6b0bd1927b788db950291058a5efd0ff3d7a31135e2b617\" returns successfully" Jul 12 00:26:16.618109 systemd[1]: run-containerd-runc-k8s.io-bc2545c9dcd60547a2ee8cc577172be3bee080d7a2f340c748a8ca6028d558a9-runc.UK7s6J.mount: Deactivated successfully. Jul 12 00:26:16.710648 env[1733]: time="2025-07-12T00:26:16.710367487Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-5lbr6,Uid:17e5c7cc-19eb-4973-833d-c011599b9537,Namespace:kube-system,Attempt:1,} returns sandbox id \"71a3a644fa323d5bb065a8e4113d70717de829912e50eacada3486e36e39db4b\"" Jul 12 00:26:16.713000 audit[4753]: AVC avc: denied { getattr } for pid=4753 comm="coredns" path="cgroup:[4026532614]" dev="nsfs" ino=4026532614 scontext=system_u:system_r:svirt_lxc_net_t:s0:c142,c719 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 Jul 12 00:26:16.713000 audit[4753]: SYSCALL arch=c00000b7 syscall=79 success=no exit=-13 a0=ffffffffffffff9c a1=4000056990 a2=400014e578 a3=0 items=0 ppid=4608 pid=4753 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c142,c719 key=(null) Jul 12 00:26:16.713000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 Jul 12 00:26:16.715831 env[1733]: time="2025-07-12T00:26:16.715761563Z" level=info msg="CreateContainer within sandbox \"71a3a644fa323d5bb065a8e4113d70717de829912e50eacada3486e36e39db4b\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Jul 12 00:26:16.772395 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2170049226.mount: Deactivated successfully. Jul 12 00:26:16.814442 env[1733]: time="2025-07-12T00:26:16.814276214Z" level=info msg="CreateContainer within sandbox \"71a3a644fa323d5bb065a8e4113d70717de829912e50eacada3486e36e39db4b\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"06f4560cf44d8e63b85d229659bb345de154bd7c2b797403b74ec46c8704bc8f\"" Jul 12 00:26:16.818049 env[1733]: time="2025-07-12T00:26:16.817982112Z" level=info msg="StartContainer for \"06f4560cf44d8e63b85d229659bb345de154bd7c2b797403b74ec46c8704bc8f\"" Jul 12 00:26:16.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.862000 audit: BPF prog-id=188 op=LOAD Jul 12 00:26:16.863000 audit[4716]: AVC avc: denied { bpf } for pid=4716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.863000 audit[4716]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4704 pid=4716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:16.863000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531323632633961633633326262333764356262373062656265366563 Jul 12 00:26:16.867000 audit[4716]: AVC avc: denied { perfmon } for pid=4716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.867000 audit[4716]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4704 pid=4716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:16.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531323632633961633633326262333764356262373062656265366563 Jul 12 00:26:16.867000 audit[4716]: AVC avc: denied { bpf } for pid=4716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.867000 audit[4716]: AVC avc: denied { bpf } for pid=4716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.867000 audit[4716]: AVC avc: denied { bpf } for pid=4716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.867000 audit[4716]: AVC avc: denied { perfmon } for pid=4716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.867000 audit[4716]: AVC avc: denied { perfmon } for pid=4716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.867000 audit[4716]: AVC avc: denied { perfmon } for pid=4716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.867000 audit[4716]: AVC avc: denied { perfmon } for pid=4716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.867000 audit[4716]: AVC avc: denied { perfmon } for pid=4716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.867000 audit[4716]: AVC avc: denied { bpf } for pid=4716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.867000 audit[4716]: AVC avc: denied { bpf } for pid=4716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.867000 audit: BPF prog-id=189 op=LOAD Jul 12 00:26:16.867000 audit[4716]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4704 pid=4716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:16.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531323632633961633633326262333764356262373062656265366563 Jul 12 00:26:16.869000 audit[4716]: AVC avc: denied { bpf } for pid=4716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.869000 audit[4716]: AVC avc: denied { bpf } for pid=4716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.869000 audit[4716]: AVC avc: denied { perfmon } for pid=4716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.869000 audit[4716]: AVC avc: denied { perfmon } for pid=4716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.869000 audit[4716]: AVC avc: denied { perfmon } for pid=4716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.869000 audit[4716]: AVC avc: denied { perfmon } for pid=4716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.869000 audit[4716]: AVC avc: denied { perfmon } for pid=4716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.869000 audit[4716]: AVC avc: denied { bpf } for pid=4716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.869000 audit[4716]: AVC avc: denied { bpf } for pid=4716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.869000 audit: BPF prog-id=190 op=LOAD Jul 12 00:26:16.869000 audit[4716]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4704 pid=4716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:16.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531323632633961633633326262333764356262373062656265366563 Jul 12 00:26:16.869000 audit: BPF prog-id=190 op=UNLOAD Jul 12 00:26:16.869000 audit: BPF prog-id=189 op=UNLOAD Jul 12 00:26:16.870000 audit[4716]: AVC avc: denied { bpf } for pid=4716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.870000 audit[4716]: AVC avc: denied { bpf } for pid=4716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.870000 audit[4716]: AVC avc: denied { bpf } for pid=4716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.870000 audit[4716]: AVC avc: denied { perfmon } for pid=4716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.870000 audit[4716]: AVC avc: denied { perfmon } for pid=4716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.870000 audit[4716]: AVC avc: denied { perfmon } for pid=4716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.870000 audit[4716]: AVC avc: denied { perfmon } for pid=4716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.870000 audit[4716]: AVC avc: denied { perfmon } for pid=4716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.870000 audit[4716]: AVC avc: denied { bpf } for pid=4716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.870000 audit[4716]: AVC avc: denied { bpf } for pid=4716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:16.870000 audit: BPF prog-id=191 op=LOAD Jul 12 00:26:16.870000 audit[4716]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4704 pid=4716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:16.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531323632633961633633326262333764356262373062656265366563 Jul 12 00:26:16.967000 audit[4847]: NETFILTER_CFG table=filter:109 family=2 entries=53 op=nft_register_chain pid=4847 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 12 00:26:16.967000 audit[4847]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=26640 a0=3 a1=ffffe914cc10 a2=0 a3=ffffa2661fa8 items=0 ppid=4021 pid=4847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:16.967000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 12 00:26:17.006136 systemd[1]: Started cri-containerd-06f4560cf44d8e63b85d229659bb345de154bd7c2b797403b74ec46c8704bc8f.scope. Jul 12 00:26:17.086446 systemd-networkd[1459]: cali4cbba91ec76: Link UP Jul 12 00:26:17.095989 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 12 00:26:17.096189 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4cbba91ec76: link becomes ready Jul 12 00:26:17.098531 systemd-networkd[1459]: cali4cbba91ec76: Gained carrier Jul 12 00:26:17.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.114000 audit: BPF prog-id=192 op=LOAD Jul 12 00:26:17.118000 audit[4868]: AVC avc: denied { bpf } for pid=4868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.118000 audit[4868]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4671 pid=4868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:17.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036663435363063663434643865363362383564323239363539626233 Jul 12 00:26:17.119000 audit[4868]: AVC avc: denied { perfmon } for pid=4868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.119000 audit[4868]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4671 pid=4868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:17.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036663435363063663434643865363362383564323239363539626233 Jul 12 00:26:17.120000 audit[4868]: AVC avc: denied { bpf } for pid=4868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.120000 audit[4868]: AVC avc: denied { bpf } for pid=4868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.120000 audit[4868]: AVC avc: denied { bpf } for pid=4868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.120000 audit[4868]: AVC avc: denied { perfmon } for pid=4868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.120000 audit[4868]: AVC avc: denied { perfmon } for pid=4868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.120000 audit[4868]: AVC avc: denied { perfmon } for pid=4868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.120000 audit[4868]: AVC avc: denied { perfmon } for pid=4868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.120000 audit[4868]: AVC avc: denied { perfmon } for pid=4868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.120000 audit[4868]: AVC avc: denied { bpf } for pid=4868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.120000 audit[4868]: AVC avc: denied { bpf } for pid=4868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.120000 audit: BPF prog-id=193 op=LOAD Jul 12 00:26:17.120000 audit[4868]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4671 pid=4868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:17.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036663435363063663434643865363362383564323239363539626233 Jul 12 00:26:17.120000 audit[4868]: AVC avc: denied { bpf } for pid=4868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.120000 audit[4868]: AVC avc: denied { bpf } for pid=4868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.120000 audit[4868]: AVC avc: denied { perfmon } for pid=4868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.120000 audit[4868]: AVC avc: denied { perfmon } for pid=4868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.120000 audit[4868]: AVC avc: denied { perfmon } for pid=4868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.120000 audit[4868]: AVC avc: denied { perfmon } for pid=4868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.120000 audit[4868]: AVC avc: denied { perfmon } for pid=4868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.120000 audit[4868]: AVC avc: denied { bpf } for pid=4868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.120000 audit[4868]: AVC avc: denied { bpf } for pid=4868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.120000 audit: BPF prog-id=194 op=LOAD Jul 12 00:26:17.120000 audit[4868]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4671 pid=4868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:17.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036663435363063663434643865363362383564323239363539626233 Jul 12 00:26:17.120000 audit: BPF prog-id=194 op=UNLOAD Jul 12 00:26:17.120000 audit: BPF prog-id=193 op=UNLOAD Jul 12 00:26:17.120000 audit[4868]: AVC avc: denied { bpf } for pid=4868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.120000 audit[4868]: AVC avc: denied { bpf } for pid=4868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.120000 audit[4868]: AVC avc: denied { bpf } for pid=4868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.120000 audit[4868]: AVC avc: denied { perfmon } for pid=4868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.120000 audit[4868]: AVC avc: denied { perfmon } for pid=4868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.120000 audit[4868]: AVC avc: denied { perfmon } for pid=4868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.120000 audit[4868]: AVC avc: denied { perfmon } for pid=4868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.120000 audit[4868]: AVC avc: denied { perfmon } for pid=4868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.120000 audit[4868]: AVC avc: denied { bpf } for pid=4868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.120000 audit[4868]: AVC avc: denied { bpf } for pid=4868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.120000 audit: BPF prog-id=195 op=LOAD Jul 12 00:26:17.120000 audit[4868]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4671 pid=4868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:17.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036663435363063663434643865363362383564323239363539626233 Jul 12 00:26:17.154568 env[1733]: 2025-07-12 00:26:16.731 [INFO][4767] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--26--167-k8s-calico--kube--controllers--5c48f86fdd--72x89-eth0 calico-kube-controllers-5c48f86fdd- calico-system 7c6c2194-2c72-4a54-9fb8-bf2e357a0987 940 0 2025-07-12 00:25:49 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:5c48f86fdd projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ip-172-31-26-167 calico-kube-controllers-5c48f86fdd-72x89 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali4cbba91ec76 [] [] }} ContainerID="bf666321dcec7f436fe286592b857e4d01fb78b02262c76d77d8e7787d7a322d" Namespace="calico-system" Pod="calico-kube-controllers-5c48f86fdd-72x89" WorkloadEndpoint="ip--172--31--26--167-k8s-calico--kube--controllers--5c48f86fdd--72x89-" Jul 12 00:26:17.154568 env[1733]: 2025-07-12 00:26:16.731 [INFO][4767] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="bf666321dcec7f436fe286592b857e4d01fb78b02262c76d77d8e7787d7a322d" Namespace="calico-system" Pod="calico-kube-controllers-5c48f86fdd-72x89" WorkloadEndpoint="ip--172--31--26--167-k8s-calico--kube--controllers--5c48f86fdd--72x89-eth0" Jul 12 00:26:17.154568 env[1733]: 2025-07-12 00:26:16.910 [INFO][4849] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="bf666321dcec7f436fe286592b857e4d01fb78b02262c76d77d8e7787d7a322d" HandleID="k8s-pod-network.bf666321dcec7f436fe286592b857e4d01fb78b02262c76d77d8e7787d7a322d" Workload="ip--172--31--26--167-k8s-calico--kube--controllers--5c48f86fdd--72x89-eth0" Jul 12 00:26:17.154568 env[1733]: 2025-07-12 00:26:16.910 [INFO][4849] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="bf666321dcec7f436fe286592b857e4d01fb78b02262c76d77d8e7787d7a322d" HandleID="k8s-pod-network.bf666321dcec7f436fe286592b857e4d01fb78b02262c76d77d8e7787d7a322d" Workload="ip--172--31--26--167-k8s-calico--kube--controllers--5c48f86fdd--72x89-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002cb0f0), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-26-167", "pod":"calico-kube-controllers-5c48f86fdd-72x89", "timestamp":"2025-07-12 00:26:16.91026443 +0000 UTC"}, Hostname:"ip-172-31-26-167", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 12 00:26:17.154568 env[1733]: 2025-07-12 00:26:16.913 [INFO][4849] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 12 00:26:17.154568 env[1733]: 2025-07-12 00:26:16.913 [INFO][4849] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 12 00:26:17.154568 env[1733]: 2025-07-12 00:26:16.913 [INFO][4849] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-26-167' Jul 12 00:26:17.154568 env[1733]: 2025-07-12 00:26:16.963 [INFO][4849] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.bf666321dcec7f436fe286592b857e4d01fb78b02262c76d77d8e7787d7a322d" host="ip-172-31-26-167" Jul 12 00:26:17.154568 env[1733]: 2025-07-12 00:26:16.990 [INFO][4849] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-26-167" Jul 12 00:26:17.154568 env[1733]: 2025-07-12 00:26:17.022 [INFO][4849] ipam/ipam.go 511: Trying affinity for 192.168.69.192/26 host="ip-172-31-26-167" Jul 12 00:26:17.154568 env[1733]: 2025-07-12 00:26:17.028 [INFO][4849] ipam/ipam.go 158: Attempting to load block cidr=192.168.69.192/26 host="ip-172-31-26-167" Jul 12 00:26:17.154568 env[1733]: 2025-07-12 00:26:17.033 [INFO][4849] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.69.192/26 host="ip-172-31-26-167" Jul 12 00:26:17.154568 env[1733]: 2025-07-12 00:26:17.033 [INFO][4849] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.69.192/26 handle="k8s-pod-network.bf666321dcec7f436fe286592b857e4d01fb78b02262c76d77d8e7787d7a322d" host="ip-172-31-26-167" Jul 12 00:26:17.154568 env[1733]: 2025-07-12 00:26:17.037 [INFO][4849] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.bf666321dcec7f436fe286592b857e4d01fb78b02262c76d77d8e7787d7a322d Jul 12 00:26:17.154568 env[1733]: 2025-07-12 00:26:17.047 [INFO][4849] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.69.192/26 handle="k8s-pod-network.bf666321dcec7f436fe286592b857e4d01fb78b02262c76d77d8e7787d7a322d" host="ip-172-31-26-167" Jul 12 00:26:17.154568 env[1733]: 2025-07-12 00:26:17.067 [INFO][4849] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.69.199/26] block=192.168.69.192/26 handle="k8s-pod-network.bf666321dcec7f436fe286592b857e4d01fb78b02262c76d77d8e7787d7a322d" host="ip-172-31-26-167" Jul 12 00:26:17.154568 env[1733]: 2025-07-12 00:26:17.067 [INFO][4849] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.69.199/26] handle="k8s-pod-network.bf666321dcec7f436fe286592b857e4d01fb78b02262c76d77d8e7787d7a322d" host="ip-172-31-26-167" Jul 12 00:26:17.154568 env[1733]: 2025-07-12 00:26:17.067 [INFO][4849] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 12 00:26:17.154568 env[1733]: 2025-07-12 00:26:17.067 [INFO][4849] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.69.199/26] IPv6=[] ContainerID="bf666321dcec7f436fe286592b857e4d01fb78b02262c76d77d8e7787d7a322d" HandleID="k8s-pod-network.bf666321dcec7f436fe286592b857e4d01fb78b02262c76d77d8e7787d7a322d" Workload="ip--172--31--26--167-k8s-calico--kube--controllers--5c48f86fdd--72x89-eth0" Jul 12 00:26:17.156081 env[1733]: 2025-07-12 00:26:17.071 [INFO][4767] cni-plugin/k8s.go 418: Populated endpoint ContainerID="bf666321dcec7f436fe286592b857e4d01fb78b02262c76d77d8e7787d7a322d" Namespace="calico-system" Pod="calico-kube-controllers-5c48f86fdd-72x89" WorkloadEndpoint="ip--172--31--26--167-k8s-calico--kube--controllers--5c48f86fdd--72x89-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--167-k8s-calico--kube--controllers--5c48f86fdd--72x89-eth0", GenerateName:"calico-kube-controllers-5c48f86fdd-", Namespace:"calico-system", SelfLink:"", UID:"7c6c2194-2c72-4a54-9fb8-bf2e357a0987", ResourceVersion:"940", Generation:0, CreationTimestamp:time.Date(2025, time.July, 12, 0, 25, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5c48f86fdd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-167", ContainerID:"", Pod:"calico-kube-controllers-5c48f86fdd-72x89", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.69.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4cbba91ec76", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 12 00:26:17.156081 env[1733]: 2025-07-12 00:26:17.071 [INFO][4767] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.69.199/32] ContainerID="bf666321dcec7f436fe286592b857e4d01fb78b02262c76d77d8e7787d7a322d" Namespace="calico-system" Pod="calico-kube-controllers-5c48f86fdd-72x89" WorkloadEndpoint="ip--172--31--26--167-k8s-calico--kube--controllers--5c48f86fdd--72x89-eth0" Jul 12 00:26:17.156081 env[1733]: 2025-07-12 00:26:17.072 [INFO][4767] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali4cbba91ec76 ContainerID="bf666321dcec7f436fe286592b857e4d01fb78b02262c76d77d8e7787d7a322d" Namespace="calico-system" Pod="calico-kube-controllers-5c48f86fdd-72x89" WorkloadEndpoint="ip--172--31--26--167-k8s-calico--kube--controllers--5c48f86fdd--72x89-eth0" Jul 12 00:26:17.156081 env[1733]: 2025-07-12 00:26:17.115 [INFO][4767] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="bf666321dcec7f436fe286592b857e4d01fb78b02262c76d77d8e7787d7a322d" Namespace="calico-system" Pod="calico-kube-controllers-5c48f86fdd-72x89" WorkloadEndpoint="ip--172--31--26--167-k8s-calico--kube--controllers--5c48f86fdd--72x89-eth0" Jul 12 00:26:17.156081 env[1733]: 2025-07-12 00:26:17.116 [INFO][4767] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="bf666321dcec7f436fe286592b857e4d01fb78b02262c76d77d8e7787d7a322d" Namespace="calico-system" Pod="calico-kube-controllers-5c48f86fdd-72x89" WorkloadEndpoint="ip--172--31--26--167-k8s-calico--kube--controllers--5c48f86fdd--72x89-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--167-k8s-calico--kube--controllers--5c48f86fdd--72x89-eth0", GenerateName:"calico-kube-controllers-5c48f86fdd-", Namespace:"calico-system", SelfLink:"", UID:"7c6c2194-2c72-4a54-9fb8-bf2e357a0987", ResourceVersion:"940", Generation:0, CreationTimestamp:time.Date(2025, time.July, 12, 0, 25, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5c48f86fdd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-167", ContainerID:"bf666321dcec7f436fe286592b857e4d01fb78b02262c76d77d8e7787d7a322d", Pod:"calico-kube-controllers-5c48f86fdd-72x89", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.69.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4cbba91ec76", MAC:"de:c1:b0:70:3a:07", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 12 00:26:17.156081 env[1733]: 2025-07-12 00:26:17.144 [INFO][4767] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="bf666321dcec7f436fe286592b857e4d01fb78b02262c76d77d8e7787d7a322d" Namespace="calico-system" Pod="calico-kube-controllers-5c48f86fdd-72x89" WorkloadEndpoint="ip--172--31--26--167-k8s-calico--kube--controllers--5c48f86fdd--72x89-eth0" Jul 12 00:26:17.168180 env[1733]: 2025-07-12 00:26:16.789 [INFO][4786] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7" Jul 12 00:26:17.168180 env[1733]: 2025-07-12 00:26:16.790 [INFO][4786] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7" iface="eth0" netns="/var/run/netns/cni-e763c7df-31d2-5f9c-ade7-fedcf9db1f3d" Jul 12 00:26:17.168180 env[1733]: 2025-07-12 00:26:16.790 [INFO][4786] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7" iface="eth0" netns="/var/run/netns/cni-e763c7df-31d2-5f9c-ade7-fedcf9db1f3d" Jul 12 00:26:17.168180 env[1733]: 2025-07-12 00:26:16.794 [INFO][4786] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7" iface="eth0" netns="/var/run/netns/cni-e763c7df-31d2-5f9c-ade7-fedcf9db1f3d" Jul 12 00:26:17.168180 env[1733]: 2025-07-12 00:26:16.795 [INFO][4786] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7" Jul 12 00:26:17.168180 env[1733]: 2025-07-12 00:26:16.795 [INFO][4786] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7" Jul 12 00:26:17.168180 env[1733]: 2025-07-12 00:26:16.982 [INFO][4855] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7" HandleID="k8s-pod-network.0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7" Workload="ip--172--31--26--167-k8s-csi--node--driver--grn85-eth0" Jul 12 00:26:17.168180 env[1733]: 2025-07-12 00:26:16.982 [INFO][4855] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 12 00:26:17.168180 env[1733]: 2025-07-12 00:26:17.067 [INFO][4855] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 12 00:26:17.168180 env[1733]: 2025-07-12 00:26:17.111 [WARNING][4855] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7" HandleID="k8s-pod-network.0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7" Workload="ip--172--31--26--167-k8s-csi--node--driver--grn85-eth0" Jul 12 00:26:17.168180 env[1733]: 2025-07-12 00:26:17.111 [INFO][4855] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7" HandleID="k8s-pod-network.0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7" Workload="ip--172--31--26--167-k8s-csi--node--driver--grn85-eth0" Jul 12 00:26:17.168180 env[1733]: 2025-07-12 00:26:17.132 [INFO][4855] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 12 00:26:17.168180 env[1733]: 2025-07-12 00:26:17.155 [INFO][4786] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7" Jul 12 00:26:17.183637 env[1733]: time="2025-07-12T00:26:17.183574020Z" level=info msg="TearDown network for sandbox \"0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7\" successfully" Jul 12 00:26:17.188418 env[1733]: time="2025-07-12T00:26:17.188348366Z" level=info msg="StopPodSandbox for \"0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7\" returns successfully" Jul 12 00:26:17.192112 env[1733]: time="2025-07-12T00:26:17.192037831Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-grn85,Uid:be5845dd-212b-4b4e-b99b-9489c28f56b4,Namespace:calico-system,Attempt:1,}" Jul 12 00:26:17.214621 env[1733]: time="2025-07-12T00:26:17.214544748Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-58fd7646b9-rmlz5,Uid:1de9e718-b4cc-4c55-aca5-2a9b50b71c00,Namespace:calico-system,Attempt:1,} returns sandbox id \"51262c9ac632bb37d5bb70bebe6ec597ad86ed7fa070d532cfa587c8f7cf7b13\"" Jul 12 00:26:17.268485 env[1733]: time="2025-07-12T00:26:17.267857632Z" level=info msg="StartContainer for \"06f4560cf44d8e63b85d229659bb345de154bd7c2b797403b74ec46c8704bc8f\" returns successfully" Jul 12 00:26:17.274133 env[1733]: time="2025-07-12T00:26:17.274000432Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 12 00:26:17.274133 env[1733]: time="2025-07-12T00:26:17.274092436Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 12 00:26:17.274533 env[1733]: time="2025-07-12T00:26:17.274447251Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 12 00:26:17.279273 env[1733]: time="2025-07-12T00:26:17.274904535Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bf666321dcec7f436fe286592b857e4d01fb78b02262c76d77d8e7787d7a322d pid=4924 runtime=io.containerd.runc.v2 Jul 12 00:26:17.293000 audit[4892]: AVC avc: denied { getattr } for pid=4892 comm="coredns" path="cgroup:[4026532994]" dev="nsfs" ino=4026532994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c119,c389 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 Jul 12 00:26:17.293000 audit[4892]: SYSCALL arch=c00000b7 syscall=79 success=no exit=-13 a0=ffffffffffffff9c a1=4000056798 a2=400014e578 a3=0 items=0 ppid=4671 pid=4892 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c119,c389 key=(null) Jul 12 00:26:17.293000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 Jul 12 00:26:17.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.317000 audit: BPF prog-id=196 op=LOAD Jul 12 00:26:17.318000 audit[4808]: AVC avc: denied { bpf } for pid=4808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.318000 audit[4808]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4796 pid=4808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:17.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263323534356339646364363035343761326565386363353737313732 Jul 12 00:26:17.318000 audit[4808]: AVC avc: denied { perfmon } for pid=4808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.318000 audit[4808]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4796 pid=4808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:17.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263323534356339646364363035343761326565386363353737313732 Jul 12 00:26:17.318000 audit[4808]: AVC avc: denied { bpf } for pid=4808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.318000 audit[4808]: AVC avc: denied { bpf } for pid=4808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.318000 audit[4808]: AVC avc: denied { bpf } for pid=4808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.318000 audit[4808]: AVC avc: denied { perfmon } for pid=4808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.318000 audit[4808]: AVC avc: denied { perfmon } for pid=4808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.318000 audit[4808]: AVC avc: denied { perfmon } for pid=4808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.318000 audit[4808]: AVC avc: denied { perfmon } for pid=4808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.318000 audit[4808]: AVC avc: denied { perfmon } for pid=4808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.318000 audit[4808]: AVC avc: denied { bpf } for pid=4808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.318000 audit[4808]: AVC avc: denied { bpf } for pid=4808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.318000 audit: BPF prog-id=197 op=LOAD Jul 12 00:26:17.318000 audit[4808]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4796 pid=4808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:17.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263323534356339646364363035343761326565386363353737313732 Jul 12 00:26:17.320000 audit[4808]: AVC avc: denied { bpf } for pid=4808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.320000 audit[4808]: AVC avc: denied { bpf } for pid=4808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.320000 audit[4808]: AVC avc: denied { perfmon } for pid=4808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.320000 audit[4808]: AVC avc: denied { perfmon } for pid=4808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.320000 audit[4808]: AVC avc: denied { perfmon } for pid=4808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.320000 audit[4808]: AVC avc: denied { perfmon } for pid=4808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.320000 audit[4808]: AVC avc: denied { perfmon } for pid=4808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.320000 audit[4808]: AVC avc: denied { bpf } for pid=4808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.320000 audit[4808]: AVC avc: denied { bpf } for pid=4808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.320000 audit: BPF prog-id=198 op=LOAD Jul 12 00:26:17.320000 audit[4808]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4796 pid=4808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:17.320000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263323534356339646364363035343761326565386363353737313732 Jul 12 00:26:17.320000 audit: BPF prog-id=198 op=UNLOAD Jul 12 00:26:17.320000 audit: BPF prog-id=197 op=UNLOAD Jul 12 00:26:17.320000 audit[4808]: AVC avc: denied { bpf } for pid=4808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.320000 audit[4808]: AVC avc: denied { bpf } for pid=4808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.320000 audit[4808]: AVC avc: denied { bpf } for pid=4808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.320000 audit[4808]: AVC avc: denied { perfmon } for pid=4808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.320000 audit[4808]: AVC avc: denied { perfmon } for pid=4808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.320000 audit[4808]: AVC avc: denied { perfmon } for pid=4808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.320000 audit[4808]: AVC avc: denied { perfmon } for pid=4808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.320000 audit[4808]: AVC avc: denied { perfmon } for pid=4808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.320000 audit[4808]: AVC avc: denied { bpf } for pid=4808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.320000 audit[4808]: AVC avc: denied { bpf } for pid=4808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.320000 audit: BPF prog-id=199 op=LOAD Jul 12 00:26:17.320000 audit[4808]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4796 pid=4808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:17.320000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263323534356339646364363035343761326565386363353737313732 Jul 12 00:26:17.358263 systemd[1]: Started cri-containerd-bf666321dcec7f436fe286592b857e4d01fb78b02262c76d77d8e7787d7a322d.scope. Jul 12 00:26:17.423917 systemd-networkd[1459]: cali186ed149bf2: Gained IPv6LL Jul 12 00:26:17.421000 audit[4959]: NETFILTER_CFG table=filter:110 family=2 entries=56 op=nft_register_chain pid=4959 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 12 00:26:17.421000 audit[4959]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=25516 a0=3 a1=ffffd4e73e00 a2=0 a3=ffffa82c3fa8 items=0 ppid=4021 pid=4959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:17.421000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 12 00:26:17.469534 systemd[1]: run-netns-cni\x2de763c7df\x2d31d2\x2d5f9c\x2dade7\x2dfedcf9db1f3d.mount: Deactivated successfully. Jul 12 00:26:17.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.478000 audit: BPF prog-id=200 op=LOAD Jul 12 00:26:17.479000 audit[4950]: AVC avc: denied { bpf } for pid=4950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.479000 audit[4950]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4924 pid=4950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:17.479000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266363636333231646365633766343336666532383635393262383537 Jul 12 00:26:17.479000 audit[4950]: AVC avc: denied { perfmon } for pid=4950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.479000 audit[4950]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4924 pid=4950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:17.479000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266363636333231646365633766343336666532383635393262383537 Jul 12 00:26:17.480000 audit[4950]: AVC avc: denied { bpf } for pid=4950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.480000 audit[4950]: AVC avc: denied { bpf } for pid=4950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.480000 audit[4950]: AVC avc: denied { bpf } for pid=4950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.480000 audit[4950]: AVC avc: denied { perfmon } for pid=4950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.480000 audit[4950]: AVC avc: denied { perfmon } for pid=4950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.480000 audit[4950]: AVC avc: denied { perfmon } for pid=4950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.480000 audit[4950]: AVC avc: denied { perfmon } for pid=4950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.480000 audit[4950]: AVC avc: denied { perfmon } for pid=4950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.480000 audit[4950]: AVC avc: denied { bpf } for pid=4950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.480000 audit[4950]: AVC avc: denied { bpf } for pid=4950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.480000 audit: BPF prog-id=201 op=LOAD Jul 12 00:26:17.480000 audit[4950]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4924 pid=4950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:17.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266363636333231646365633766343336666532383635393262383537 Jul 12 00:26:17.480000 audit[4950]: AVC avc: denied { bpf } for pid=4950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.480000 audit[4950]: AVC avc: denied { bpf } for pid=4950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.480000 audit[4950]: AVC avc: denied { perfmon } for pid=4950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.480000 audit[4950]: AVC avc: denied { perfmon } for pid=4950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.480000 audit[4950]: AVC avc: denied { perfmon } for pid=4950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.480000 audit[4950]: AVC avc: denied { perfmon } for pid=4950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.480000 audit[4950]: AVC avc: denied { perfmon } for pid=4950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.480000 audit[4950]: AVC avc: denied { bpf } for pid=4950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.480000 audit[4950]: AVC avc: denied { bpf } for pid=4950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.480000 audit: BPF prog-id=202 op=LOAD Jul 12 00:26:17.480000 audit[4950]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4924 pid=4950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:17.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266363636333231646365633766343336666532383635393262383537 Jul 12 00:26:17.480000 audit: BPF prog-id=202 op=UNLOAD Jul 12 00:26:17.480000 audit: BPF prog-id=201 op=UNLOAD Jul 12 00:26:17.480000 audit[4950]: AVC avc: denied { bpf } for pid=4950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.480000 audit[4950]: AVC avc: denied { bpf } for pid=4950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.480000 audit[4950]: AVC avc: denied { bpf } for pid=4950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.480000 audit[4950]: AVC avc: denied { perfmon } for pid=4950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.480000 audit[4950]: AVC avc: denied { perfmon } for pid=4950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.480000 audit[4950]: AVC avc: denied { perfmon } for pid=4950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.480000 audit[4950]: AVC avc: denied { perfmon } for pid=4950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.480000 audit[4950]: AVC avc: denied { perfmon } for pid=4950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.480000 audit[4950]: AVC avc: denied { bpf } for pid=4950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.480000 audit[4950]: AVC avc: denied { bpf } for pid=4950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:17.480000 audit: BPF prog-id=203 op=LOAD Jul 12 00:26:17.480000 audit[4950]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4924 pid=4950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:17.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266363636333231646365633766343336666532383635393262383537 Jul 12 00:26:17.563560 env[1733]: time="2025-07-12T00:26:17.563499703Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5c48f86fdd-72x89,Uid:7c6c2194-2c72-4a54-9fb8-bf2e357a0987,Namespace:calico-system,Attempt:1,} returns sandbox id \"bf666321dcec7f436fe286592b857e4d01fb78b02262c76d77d8e7787d7a322d\"" Jul 12 00:26:17.633755 env[1733]: time="2025-07-12T00:26:17.630126010Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-b5644b9bf-kx5cn,Uid:e3812f81-11a9-4dfb-a0f5-cf6c3ca45a4d,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"bc2545c9dcd60547a2ee8cc577172be3bee080d7a2f340c748a8ca6028d558a9\"" Jul 12 00:26:17.679472 systemd-networkd[1459]: cali9bd5a379afe: Gained IPv6LL Jul 12 00:26:17.694266 kubelet[2742]: I0712 00:26:17.694153 2742 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7c65d6cfc9-5lbr6" podStartSLOduration=53.694128822 podStartE2EDuration="53.694128822s" podCreationTimestamp="2025-07-12 00:25:24 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-07-12 00:26:17.640629878 +0000 UTC m=+58.784609156" watchObservedRunningTime="2025-07-12 00:26:17.694128822 +0000 UTC m=+58.838108064" Jul 12 00:26:17.752914 kubelet[2742]: I0712 00:26:17.752791 2742 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7c65d6cfc9-rtg8v" podStartSLOduration=53.752767524 podStartE2EDuration="53.752767524s" podCreationTimestamp="2025-07-12 00:25:24 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-07-12 00:26:17.697782587 +0000 UTC m=+58.841762285" watchObservedRunningTime="2025-07-12 00:26:17.752767524 +0000 UTC m=+58.896746790" Jul 12 00:26:17.752000 audit[4996]: NETFILTER_CFG table=filter:111 family=2 entries=20 op=nft_register_rule pid=4996 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:26:17.752000 audit[4996]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=7480 a0=3 a1=ffffc1fdc870 a2=0 a3=1 items=0 ppid=2843 pid=4996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:17.752000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:26:17.765000 audit[4996]: NETFILTER_CFG table=nat:112 family=2 entries=14 op=nft_register_rule pid=4996 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:26:17.765000 audit[4996]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=ffffc1fdc870 a2=0 a3=1 items=0 ppid=2843 pid=4996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:17.765000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:26:17.818707 systemd-networkd[1459]: cali057d08134e9: Link UP Jul 12 00:26:17.823731 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali057d08134e9: link becomes ready Jul 12 00:26:17.824100 systemd-networkd[1459]: cali057d08134e9: Gained carrier Jul 12 00:26:17.852000 audit[5000]: NETFILTER_CFG table=filter:113 family=2 entries=17 op=nft_register_rule pid=5000 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:26:17.852000 audit[5000]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=fffff3971930 a2=0 a3=1 items=0 ppid=2843 pid=5000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:17.852000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:26:17.864000 audit[5000]: NETFILTER_CFG table=nat:114 family=2 entries=35 op=nft_register_chain pid=5000 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:26:17.864000 audit[5000]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=fffff3971930 a2=0 a3=1 items=0 ppid=2843 pid=5000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:17.864000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:26:17.876633 env[1733]: 2025-07-12 00:26:17.418 [INFO][4927] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--26--167-k8s-csi--node--driver--grn85-eth0 csi-node-driver- calico-system be5845dd-212b-4b4e-b99b-9489c28f56b4 957 0 2025-07-12 00:25:49 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:57bd658777 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ip-172-31-26-167 csi-node-driver-grn85 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali057d08134e9 [] [] }} ContainerID="704bdc0ab1f385b6a10a8cb91563ebe794cd367e6f6f40c6830d6bf532f3ed91" Namespace="calico-system" Pod="csi-node-driver-grn85" WorkloadEndpoint="ip--172--31--26--167-k8s-csi--node--driver--grn85-" Jul 12 00:26:17.876633 env[1733]: 2025-07-12 00:26:17.418 [INFO][4927] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="704bdc0ab1f385b6a10a8cb91563ebe794cd367e6f6f40c6830d6bf532f3ed91" Namespace="calico-system" Pod="csi-node-driver-grn85" WorkloadEndpoint="ip--172--31--26--167-k8s-csi--node--driver--grn85-eth0" Jul 12 00:26:17.876633 env[1733]: 2025-07-12 00:26:17.537 [INFO][4973] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="704bdc0ab1f385b6a10a8cb91563ebe794cd367e6f6f40c6830d6bf532f3ed91" HandleID="k8s-pod-network.704bdc0ab1f385b6a10a8cb91563ebe794cd367e6f6f40c6830d6bf532f3ed91" Workload="ip--172--31--26--167-k8s-csi--node--driver--grn85-eth0" Jul 12 00:26:17.876633 env[1733]: 2025-07-12 00:26:17.538 [INFO][4973] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="704bdc0ab1f385b6a10a8cb91563ebe794cd367e6f6f40c6830d6bf532f3ed91" HandleID="k8s-pod-network.704bdc0ab1f385b6a10a8cb91563ebe794cd367e6f6f40c6830d6bf532f3ed91" Workload="ip--172--31--26--167-k8s-csi--node--driver--grn85-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002cb920), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-26-167", "pod":"csi-node-driver-grn85", "timestamp":"2025-07-12 00:26:17.537410182 +0000 UTC"}, Hostname:"ip-172-31-26-167", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 12 00:26:17.876633 env[1733]: 2025-07-12 00:26:17.538 [INFO][4973] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 12 00:26:17.876633 env[1733]: 2025-07-12 00:26:17.539 [INFO][4973] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 12 00:26:17.876633 env[1733]: 2025-07-12 00:26:17.539 [INFO][4973] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-26-167' Jul 12 00:26:17.876633 env[1733]: 2025-07-12 00:26:17.556 [INFO][4973] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.704bdc0ab1f385b6a10a8cb91563ebe794cd367e6f6f40c6830d6bf532f3ed91" host="ip-172-31-26-167" Jul 12 00:26:17.876633 env[1733]: 2025-07-12 00:26:17.580 [INFO][4973] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-26-167" Jul 12 00:26:17.876633 env[1733]: 2025-07-12 00:26:17.644 [INFO][4973] ipam/ipam.go 511: Trying affinity for 192.168.69.192/26 host="ip-172-31-26-167" Jul 12 00:26:17.876633 env[1733]: 2025-07-12 00:26:17.657 [INFO][4973] ipam/ipam.go 158: Attempting to load block cidr=192.168.69.192/26 host="ip-172-31-26-167" Jul 12 00:26:17.876633 env[1733]: 2025-07-12 00:26:17.696 [INFO][4973] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.69.192/26 host="ip-172-31-26-167" Jul 12 00:26:17.876633 env[1733]: 2025-07-12 00:26:17.696 [INFO][4973] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.69.192/26 handle="k8s-pod-network.704bdc0ab1f385b6a10a8cb91563ebe794cd367e6f6f40c6830d6bf532f3ed91" host="ip-172-31-26-167" Jul 12 00:26:17.876633 env[1733]: 2025-07-12 00:26:17.704 [INFO][4973] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.704bdc0ab1f385b6a10a8cb91563ebe794cd367e6f6f40c6830d6bf532f3ed91 Jul 12 00:26:17.876633 env[1733]: 2025-07-12 00:26:17.735 [INFO][4973] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.69.192/26 handle="k8s-pod-network.704bdc0ab1f385b6a10a8cb91563ebe794cd367e6f6f40c6830d6bf532f3ed91" host="ip-172-31-26-167" Jul 12 00:26:17.876633 env[1733]: 2025-07-12 00:26:17.795 [INFO][4973] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.69.200/26] block=192.168.69.192/26 handle="k8s-pod-network.704bdc0ab1f385b6a10a8cb91563ebe794cd367e6f6f40c6830d6bf532f3ed91" host="ip-172-31-26-167" Jul 12 00:26:17.876633 env[1733]: 2025-07-12 00:26:17.795 [INFO][4973] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.69.200/26] handle="k8s-pod-network.704bdc0ab1f385b6a10a8cb91563ebe794cd367e6f6f40c6830d6bf532f3ed91" host="ip-172-31-26-167" Jul 12 00:26:17.876633 env[1733]: 2025-07-12 00:26:17.795 [INFO][4973] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 12 00:26:17.876633 env[1733]: 2025-07-12 00:26:17.795 [INFO][4973] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.69.200/26] IPv6=[] ContainerID="704bdc0ab1f385b6a10a8cb91563ebe794cd367e6f6f40c6830d6bf532f3ed91" HandleID="k8s-pod-network.704bdc0ab1f385b6a10a8cb91563ebe794cd367e6f6f40c6830d6bf532f3ed91" Workload="ip--172--31--26--167-k8s-csi--node--driver--grn85-eth0" Jul 12 00:26:17.878062 env[1733]: 2025-07-12 00:26:17.798 [INFO][4927] cni-plugin/k8s.go 418: Populated endpoint ContainerID="704bdc0ab1f385b6a10a8cb91563ebe794cd367e6f6f40c6830d6bf532f3ed91" Namespace="calico-system" Pod="csi-node-driver-grn85" WorkloadEndpoint="ip--172--31--26--167-k8s-csi--node--driver--grn85-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--167-k8s-csi--node--driver--grn85-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"be5845dd-212b-4b4e-b99b-9489c28f56b4", ResourceVersion:"957", Generation:0, CreationTimestamp:time.Date(2025, time.July, 12, 0, 25, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"57bd658777", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-167", ContainerID:"", Pod:"csi-node-driver-grn85", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.69.200/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali057d08134e9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 12 00:26:17.878062 env[1733]: 2025-07-12 00:26:17.799 [INFO][4927] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.69.200/32] ContainerID="704bdc0ab1f385b6a10a8cb91563ebe794cd367e6f6f40c6830d6bf532f3ed91" Namespace="calico-system" Pod="csi-node-driver-grn85" WorkloadEndpoint="ip--172--31--26--167-k8s-csi--node--driver--grn85-eth0" Jul 12 00:26:17.878062 env[1733]: 2025-07-12 00:26:17.799 [INFO][4927] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali057d08134e9 ContainerID="704bdc0ab1f385b6a10a8cb91563ebe794cd367e6f6f40c6830d6bf532f3ed91" Namespace="calico-system" Pod="csi-node-driver-grn85" WorkloadEndpoint="ip--172--31--26--167-k8s-csi--node--driver--grn85-eth0" Jul 12 00:26:17.878062 env[1733]: 2025-07-12 00:26:17.830 [INFO][4927] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="704bdc0ab1f385b6a10a8cb91563ebe794cd367e6f6f40c6830d6bf532f3ed91" Namespace="calico-system" Pod="csi-node-driver-grn85" WorkloadEndpoint="ip--172--31--26--167-k8s-csi--node--driver--grn85-eth0" Jul 12 00:26:17.878062 env[1733]: 2025-07-12 00:26:17.830 [INFO][4927] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="704bdc0ab1f385b6a10a8cb91563ebe794cd367e6f6f40c6830d6bf532f3ed91" Namespace="calico-system" Pod="csi-node-driver-grn85" WorkloadEndpoint="ip--172--31--26--167-k8s-csi--node--driver--grn85-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--167-k8s-csi--node--driver--grn85-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"be5845dd-212b-4b4e-b99b-9489c28f56b4", ResourceVersion:"957", Generation:0, CreationTimestamp:time.Date(2025, time.July, 12, 0, 25, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"57bd658777", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-167", ContainerID:"704bdc0ab1f385b6a10a8cb91563ebe794cd367e6f6f40c6830d6bf532f3ed91", Pod:"csi-node-driver-grn85", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.69.200/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali057d08134e9", MAC:"f6:ed:06:28:d0:6f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 12 00:26:17.878062 env[1733]: 2025-07-12 00:26:17.873 [INFO][4927] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="704bdc0ab1f385b6a10a8cb91563ebe794cd367e6f6f40c6830d6bf532f3ed91" Namespace="calico-system" Pod="csi-node-driver-grn85" WorkloadEndpoint="ip--172--31--26--167-k8s-csi--node--driver--grn85-eth0" Jul 12 00:26:17.953322 env[1733]: time="2025-07-12T00:26:17.953114012Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 12 00:26:17.954316 env[1733]: time="2025-07-12T00:26:17.954252462Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 12 00:26:17.955303 env[1733]: time="2025-07-12T00:26:17.954617993Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 12 00:26:17.960126 env[1733]: time="2025-07-12T00:26:17.960006655Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/704bdc0ab1f385b6a10a8cb91563ebe794cd367e6f6f40c6830d6bf532f3ed91 pid=5013 runtime=io.containerd.runc.v2 Jul 12 00:26:18.086471 systemd[1]: run-containerd-runc-k8s.io-704bdc0ab1f385b6a10a8cb91563ebe794cd367e6f6f40c6830d6bf532f3ed91-runc.DOGgaR.mount: Deactivated successfully. Jul 12 00:26:18.103094 systemd[1]: Started cri-containerd-704bdc0ab1f385b6a10a8cb91563ebe794cd367e6f6f40c6830d6bf532f3ed91.scope. Jul 12 00:26:18.191543 systemd-networkd[1459]: cali383ea7bdef1: Gained IPv6LL Jul 12 00:26:18.387581 systemd[1]: Started sshd@7-172.31.26.167:22-147.75.109.163:37460.service. Jul 12 00:26:18.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.26.167:22-147.75.109.163:37460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:26:18.622304 sshd[5038]: Accepted publickey for core from 147.75.109.163 port 37460 ssh2: RSA SHA256:hAayEOBHnTpwll2xPQSU8cSp7XCWn/pXChvPbqogNKA Jul 12 00:26:18.621000 audit[5038]: USER_ACCT pid=5038 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:18.623000 audit[5038]: CRED_ACQ pid=5038 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:18.624000 audit[5038]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcbce6320 a2=3 a3=1 items=0 ppid=1 pid=5038 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:18.624000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 12 00:26:18.629719 sshd[5038]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 12 00:26:18.655499 systemd-logind[1726]: New session 8 of user core. Jul 12 00:26:18.658195 systemd[1]: Started session-8.scope. Jul 12 00:26:18.692000 audit[5038]: USER_START pid=5038 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:18.696000 audit[5041]: CRED_ACQ pid=5041 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:18.846000 audit[5053]: NETFILTER_CFG table=filter:115 family=2 entries=60 op=nft_register_chain pid=5053 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 12 00:26:18.846000 audit[5053]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=26704 a0=3 a1=ffffe43698d0 a2=0 a3=ffff9b717fa8 items=0 ppid=4021 pid=5053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:18.846000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 12 00:26:18.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:18.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:18.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:18.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:18.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:18.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:18.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:18.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:18.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:18.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:18.854000 audit: BPF prog-id=204 op=LOAD Jul 12 00:26:18.855000 audit[5025]: AVC avc: denied { bpf } for pid=5025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:18.855000 audit[5025]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=5013 pid=5025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:18.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730346264633061623166333835623661313061386362393135363365 Jul 12 00:26:18.855000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:18.855000 audit[5025]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=5013 pid=5025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:18.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730346264633061623166333835623661313061386362393135363365 Jul 12 00:26:18.855000 audit[5025]: AVC avc: denied { bpf } for pid=5025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:18.855000 audit[5025]: AVC avc: denied { bpf } for pid=5025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:18.855000 audit[5025]: AVC avc: denied { bpf } for pid=5025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:18.855000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:18.855000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:18.855000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:18.855000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:18.855000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:18.855000 audit[5025]: AVC avc: denied { bpf } for pid=5025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:18.855000 audit[5025]: AVC avc: denied { bpf } for pid=5025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:18.855000 audit: BPF prog-id=205 op=LOAD Jul 12 00:26:18.855000 audit[5025]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=5013 pid=5025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:18.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730346264633061623166333835623661313061386362393135363365 Jul 12 00:26:18.856000 audit[5025]: AVC avc: denied { bpf } for pid=5025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:18.856000 audit[5025]: AVC avc: denied { bpf } for pid=5025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:18.856000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:18.856000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:18.856000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:18.856000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:18.856000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:18.856000 audit[5025]: AVC avc: denied { bpf } for pid=5025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:18.856000 audit[5025]: AVC avc: denied { bpf } for pid=5025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:18.856000 audit: BPF prog-id=206 op=LOAD Jul 12 00:26:18.856000 audit[5025]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=5013 pid=5025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:18.856000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730346264633061623166333835623661313061386362393135363365 Jul 12 00:26:18.856000 audit: BPF prog-id=206 op=UNLOAD Jul 12 00:26:18.856000 audit: BPF prog-id=205 op=UNLOAD Jul 12 00:26:18.856000 audit[5025]: AVC avc: denied { bpf } for pid=5025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:18.856000 audit[5025]: AVC avc: denied { bpf } for pid=5025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:18.856000 audit[5025]: AVC avc: denied { bpf } for pid=5025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:18.856000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:18.856000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:18.856000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:18.856000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:18.856000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:18.856000 audit[5025]: AVC avc: denied { bpf } for pid=5025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:18.856000 audit[5025]: AVC avc: denied { bpf } for pid=5025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:18.856000 audit: BPF prog-id=207 op=LOAD Jul 12 00:26:18.856000 audit[5025]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=5013 pid=5025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:18.856000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730346264633061623166333835623661313061386362393135363365 Jul 12 00:26:18.923558 env[1733]: time="2025-07-12T00:26:18.923406663Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-grn85,Uid:be5845dd-212b-4b4e-b99b-9489c28f56b4,Namespace:calico-system,Attempt:1,} returns sandbox id \"704bdc0ab1f385b6a10a8cb91563ebe794cd367e6f6f40c6830d6bf532f3ed91\"" Jul 12 00:26:18.959489 systemd-networkd[1459]: cali4cbba91ec76: Gained IPv6LL Jul 12 00:26:19.141914 env[1733]: time="2025-07-12T00:26:19.141846516Z" level=info msg="StopPodSandbox for \"c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa\"" Jul 12 00:26:19.167717 kernel: kauditd_printk_skb: 631 callbacks suppressed Jul 12 00:26:19.167914 kernel: audit: type=1325 audit(1752279979.164:1353): table=filter:116 family=2 entries=14 op=nft_register_rule pid=5071 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:26:19.164000 audit[5071]: NETFILTER_CFG table=filter:116 family=2 entries=14 op=nft_register_rule pid=5071 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:26:19.164000 audit[5071]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=fffff8526800 a2=0 a3=1 items=0 ppid=2843 pid=5071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:19.191294 kernel: audit: type=1300 audit(1752279979.164:1353): arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=fffff8526800 a2=0 a3=1 items=0 ppid=2843 pid=5071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:19.164000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:26:19.203070 kernel: audit: type=1327 audit(1752279979.164:1353): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:26:19.209000 audit[2485]: AVC avc: denied { watch } for pid=2485 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7344 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:26:19.209000 audit[2485]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4002e174c0 a2=fc6 a3=0 items=0 ppid=2324 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c411 key=(null) Jul 12 00:26:19.247595 kernel: audit: type=1400 audit(1752279979.209:1354): avc: denied { watch } for pid=2485 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7344 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:26:19.247780 kernel: audit: type=1300 audit(1752279979.209:1354): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4002e174c0 a2=fc6 a3=0 items=0 ppid=2324 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c411 key=(null) Jul 12 00:26:19.209000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 12 00:26:19.265921 kernel: audit: type=1327 audit(1752279979.209:1354): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 12 00:26:19.220000 audit[2485]: AVC avc: denied { watch } for pid=2485 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7344 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:26:19.282555 kernel: audit: type=1400 audit(1752279979.220:1355): avc: denied { watch } for pid=2485 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7344 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:26:19.285243 sshd[5038]: pam_unix(sshd:session): session closed for user core Jul 12 00:26:19.291599 systemd[1]: session-8.scope: Deactivated successfully. Jul 12 00:26:19.292859 systemd[1]: sshd@7-172.31.26.167:22-147.75.109.163:37460.service: Deactivated successfully. Jul 12 00:26:19.296090 systemd-logind[1726]: Session 8 logged out. Waiting for processes to exit. Jul 12 00:26:19.297859 systemd-logind[1726]: Removed session 8. Jul 12 00:26:19.220000 audit[2485]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4002e17660 a2=fc6 a3=0 items=0 ppid=2324 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c411 key=(null) Jul 12 00:26:19.310980 kernel: audit: type=1300 audit(1752279979.220:1355): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4002e17660 a2=fc6 a3=0 items=0 ppid=2324 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c411 key=(null) Jul 12 00:26:19.220000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 12 00:26:19.328826 kernel: audit: type=1327 audit(1752279979.220:1355): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 12 00:26:19.220000 audit[2485]: AVC avc: denied { watch } for pid=2485 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7344 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:26:19.220000 audit[2485]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4002e17680 a2=fc6 a3=0 items=0 ppid=2324 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c411 key=(null) Jul 12 00:26:19.220000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 12 00:26:19.224000 audit[2485]: AVC avc: denied { watch } for pid=2485 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7344 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:26:19.224000 audit[2485]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4002fbf420 a2=fc6 a3=0 items=0 ppid=2324 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c411 key=(null) Jul 12 00:26:19.224000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 12 00:26:19.254000 audit[5071]: NETFILTER_CFG table=nat:117 family=2 entries=56 op=nft_register_chain pid=5071 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:26:19.254000 audit[5071]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19860 a0=3 a1=fffff8526800 a2=0 a3=1 items=0 ppid=2843 pid=5071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:19.375765 kernel: audit: type=1400 audit(1752279979.220:1356): avc: denied { watch } for pid=2485 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7344 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:26:19.254000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:26:19.288000 audit[5038]: USER_END pid=5038 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:19.288000 audit[5038]: CRED_DISP pid=5038 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:19.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.26.167:22-147.75.109.163:37460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:26:19.640142 env[1733]: 2025-07-12 00:26:19.371 [WARNING][5084] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--167-k8s-coredns--7c65d6cfc9--5lbr6-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"17e5c7cc-19eb-4973-833d-c011599b9537", ResourceVersion:"980", Generation:0, CreationTimestamp:time.Date(2025, time.July, 12, 0, 25, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-167", ContainerID:"71a3a644fa323d5bb065a8e4113d70717de829912e50eacada3486e36e39db4b", Pod:"coredns-7c65d6cfc9-5lbr6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.69.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9bd5a379afe", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 12 00:26:19.640142 env[1733]: 2025-07-12 00:26:19.372 [INFO][5084] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa" Jul 12 00:26:19.640142 env[1733]: 2025-07-12 00:26:19.372 [INFO][5084] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa" iface="eth0" netns="" Jul 12 00:26:19.640142 env[1733]: 2025-07-12 00:26:19.372 [INFO][5084] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa" Jul 12 00:26:19.640142 env[1733]: 2025-07-12 00:26:19.372 [INFO][5084] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa" Jul 12 00:26:19.640142 env[1733]: 2025-07-12 00:26:19.574 [INFO][5101] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa" HandleID="k8s-pod-network.c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa" Workload="ip--172--31--26--167-k8s-coredns--7c65d6cfc9--5lbr6-eth0" Jul 12 00:26:19.640142 env[1733]: 2025-07-12 00:26:19.575 [INFO][5101] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 12 00:26:19.640142 env[1733]: 2025-07-12 00:26:19.576 [INFO][5101] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 12 00:26:19.640142 env[1733]: 2025-07-12 00:26:19.610 [WARNING][5101] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa" HandleID="k8s-pod-network.c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa" Workload="ip--172--31--26--167-k8s-coredns--7c65d6cfc9--5lbr6-eth0" Jul 12 00:26:19.640142 env[1733]: 2025-07-12 00:26:19.610 [INFO][5101] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa" HandleID="k8s-pod-network.c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa" Workload="ip--172--31--26--167-k8s-coredns--7c65d6cfc9--5lbr6-eth0" Jul 12 00:26:19.640142 env[1733]: 2025-07-12 00:26:19.621 [INFO][5101] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 12 00:26:19.640142 env[1733]: 2025-07-12 00:26:19.634 [INFO][5084] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa" Jul 12 00:26:19.641829 env[1733]: time="2025-07-12T00:26:19.641771632Z" level=info msg="TearDown network for sandbox \"c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa\" successfully" Jul 12 00:26:19.642003 env[1733]: time="2025-07-12T00:26:19.641966452Z" level=info msg="StopPodSandbox for \"c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa\" returns successfully" Jul 12 00:26:19.643063 env[1733]: time="2025-07-12T00:26:19.643004322Z" level=info msg="RemovePodSandbox for \"c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa\"" Jul 12 00:26:19.643410 env[1733]: time="2025-07-12T00:26:19.643335822Z" level=info msg="Forcibly stopping sandbox \"c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa\"" Jul 12 00:26:19.861505 systemd-networkd[1459]: cali057d08134e9: Gained IPv6LL Jul 12 00:26:20.042071 env[1733]: 2025-07-12 00:26:19.818 [WARNING][5128] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--167-k8s-coredns--7c65d6cfc9--5lbr6-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"17e5c7cc-19eb-4973-833d-c011599b9537", ResourceVersion:"980", Generation:0, CreationTimestamp:time.Date(2025, time.July, 12, 0, 25, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-167", ContainerID:"71a3a644fa323d5bb065a8e4113d70717de829912e50eacada3486e36e39db4b", Pod:"coredns-7c65d6cfc9-5lbr6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.69.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9bd5a379afe", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 12 00:26:20.042071 env[1733]: 2025-07-12 00:26:19.822 [INFO][5128] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa" Jul 12 00:26:20.042071 env[1733]: 2025-07-12 00:26:19.822 [INFO][5128] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa" iface="eth0" netns="" Jul 12 00:26:20.042071 env[1733]: 2025-07-12 00:26:19.822 [INFO][5128] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa" Jul 12 00:26:20.042071 env[1733]: 2025-07-12 00:26:19.823 [INFO][5128] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa" Jul 12 00:26:20.042071 env[1733]: 2025-07-12 00:26:20.007 [INFO][5135] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa" HandleID="k8s-pod-network.c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa" Workload="ip--172--31--26--167-k8s-coredns--7c65d6cfc9--5lbr6-eth0" Jul 12 00:26:20.042071 env[1733]: 2025-07-12 00:26:20.014 [INFO][5135] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 12 00:26:20.042071 env[1733]: 2025-07-12 00:26:20.014 [INFO][5135] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 12 00:26:20.042071 env[1733]: 2025-07-12 00:26:20.030 [WARNING][5135] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa" HandleID="k8s-pod-network.c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa" Workload="ip--172--31--26--167-k8s-coredns--7c65d6cfc9--5lbr6-eth0" Jul 12 00:26:20.042071 env[1733]: 2025-07-12 00:26:20.030 [INFO][5135] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa" HandleID="k8s-pod-network.c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa" Workload="ip--172--31--26--167-k8s-coredns--7c65d6cfc9--5lbr6-eth0" Jul 12 00:26:20.042071 env[1733]: 2025-07-12 00:26:20.032 [INFO][5135] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 12 00:26:20.042071 env[1733]: 2025-07-12 00:26:20.035 [INFO][5128] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa" Jul 12 00:26:20.045015 env[1733]: time="2025-07-12T00:26:20.044947916Z" level=info msg="TearDown network for sandbox \"c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa\" successfully" Jul 12 00:26:20.060479 env[1733]: time="2025-07-12T00:26:20.060398511Z" level=info msg="RemovePodSandbox \"c290e04a9cc1324d75b269e2516a637191368fd1edf00937ddd34f87e2b3b6fa\" returns successfully" Jul 12 00:26:20.064181 env[1733]: time="2025-07-12T00:26:20.064108466Z" level=info msg="StopPodSandbox for \"8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85\"" Jul 12 00:26:20.391541 env[1733]: 2025-07-12 00:26:20.248 [WARNING][5149] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--tg2s7-eth0", GenerateName:"calico-apiserver-b5644b9bf-", Namespace:"calico-apiserver", SelfLink:"", UID:"288994cc-ff1d-4a1a-a404-e0b6cf8e19f6", ResourceVersion:"919", Generation:0, CreationTimestamp:time.Date(2025, time.July, 12, 0, 25, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"b5644b9bf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-167", ContainerID:"e337c4de4667bcfe99f8ff8a5ce4df49f8959b57d38965c959864e610bc21761", Pod:"calico-apiserver-b5644b9bf-tg2s7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.69.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliac7262059b1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 12 00:26:20.391541 env[1733]: 2025-07-12 00:26:20.249 [INFO][5149] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85" Jul 12 00:26:20.391541 env[1733]: 2025-07-12 00:26:20.249 [INFO][5149] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85" iface="eth0" netns="" Jul 12 00:26:20.391541 env[1733]: 2025-07-12 00:26:20.249 [INFO][5149] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85" Jul 12 00:26:20.391541 env[1733]: 2025-07-12 00:26:20.249 [INFO][5149] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85" Jul 12 00:26:20.391541 env[1733]: 2025-07-12 00:26:20.348 [INFO][5156] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85" HandleID="k8s-pod-network.8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85" Workload="ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--tg2s7-eth0" Jul 12 00:26:20.391541 env[1733]: 2025-07-12 00:26:20.349 [INFO][5156] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 12 00:26:20.391541 env[1733]: 2025-07-12 00:26:20.349 [INFO][5156] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 12 00:26:20.391541 env[1733]: 2025-07-12 00:26:20.381 [WARNING][5156] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85" HandleID="k8s-pod-network.8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85" Workload="ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--tg2s7-eth0" Jul 12 00:26:20.391541 env[1733]: 2025-07-12 00:26:20.381 [INFO][5156] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85" HandleID="k8s-pod-network.8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85" Workload="ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--tg2s7-eth0" Jul 12 00:26:20.391541 env[1733]: 2025-07-12 00:26:20.386 [INFO][5156] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 12 00:26:20.391541 env[1733]: 2025-07-12 00:26:20.388 [INFO][5149] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85" Jul 12 00:26:20.392743 env[1733]: time="2025-07-12T00:26:20.392670506Z" level=info msg="TearDown network for sandbox \"8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85\" successfully" Jul 12 00:26:20.392910 env[1733]: time="2025-07-12T00:26:20.392856855Z" level=info msg="StopPodSandbox for \"8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85\" returns successfully" Jul 12 00:26:20.393857 env[1733]: time="2025-07-12T00:26:20.393798173Z" level=info msg="RemovePodSandbox for \"8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85\"" Jul 12 00:26:20.394172 env[1733]: time="2025-07-12T00:26:20.394100670Z" level=info msg="Forcibly stopping sandbox \"8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85\"" Jul 12 00:26:20.699237 env[1733]: 2025-07-12 00:26:20.555 [WARNING][5170] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--tg2s7-eth0", GenerateName:"calico-apiserver-b5644b9bf-", Namespace:"calico-apiserver", SelfLink:"", UID:"288994cc-ff1d-4a1a-a404-e0b6cf8e19f6", ResourceVersion:"919", Generation:0, CreationTimestamp:time.Date(2025, time.July, 12, 0, 25, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"b5644b9bf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-167", ContainerID:"e337c4de4667bcfe99f8ff8a5ce4df49f8959b57d38965c959864e610bc21761", Pod:"calico-apiserver-b5644b9bf-tg2s7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.69.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliac7262059b1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 12 00:26:20.699237 env[1733]: 2025-07-12 00:26:20.555 [INFO][5170] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85" Jul 12 00:26:20.699237 env[1733]: 2025-07-12 00:26:20.555 [INFO][5170] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85" iface="eth0" netns="" Jul 12 00:26:20.699237 env[1733]: 2025-07-12 00:26:20.555 [INFO][5170] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85" Jul 12 00:26:20.699237 env[1733]: 2025-07-12 00:26:20.556 [INFO][5170] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85" Jul 12 00:26:20.699237 env[1733]: 2025-07-12 00:26:20.664 [INFO][5178] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85" HandleID="k8s-pod-network.8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85" Workload="ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--tg2s7-eth0" Jul 12 00:26:20.699237 env[1733]: 2025-07-12 00:26:20.664 [INFO][5178] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 12 00:26:20.699237 env[1733]: 2025-07-12 00:26:20.664 [INFO][5178] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 12 00:26:20.699237 env[1733]: 2025-07-12 00:26:20.689 [WARNING][5178] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85" HandleID="k8s-pod-network.8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85" Workload="ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--tg2s7-eth0" Jul 12 00:26:20.699237 env[1733]: 2025-07-12 00:26:20.689 [INFO][5178] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85" HandleID="k8s-pod-network.8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85" Workload="ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--tg2s7-eth0" Jul 12 00:26:20.699237 env[1733]: 2025-07-12 00:26:20.692 [INFO][5178] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 12 00:26:20.699237 env[1733]: 2025-07-12 00:26:20.695 [INFO][5170] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85" Jul 12 00:26:20.699237 env[1733]: time="2025-07-12T00:26:20.699193680Z" level=info msg="TearDown network for sandbox \"8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85\" successfully" Jul 12 00:26:20.708893 env[1733]: time="2025-07-12T00:26:20.708821151Z" level=info msg="RemovePodSandbox \"8834980961aa798df5b85905c26ad1449f30ba4c3f087fbf0a75dfe172f11e85\" returns successfully" Jul 12 00:26:20.710015 env[1733]: time="2025-07-12T00:26:20.709951279Z" level=info msg="StopPodSandbox for \"25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a\"" Jul 12 00:26:20.977733 env[1733]: 2025-07-12 00:26:20.846 [WARNING][5193] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a" WorkloadEndpoint="ip--172--31--26--167-k8s-whisker--694fcf6c96--9tks2-eth0" Jul 12 00:26:20.977733 env[1733]: 2025-07-12 00:26:20.847 [INFO][5193] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a" Jul 12 00:26:20.977733 env[1733]: 2025-07-12 00:26:20.847 [INFO][5193] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a" iface="eth0" netns="" Jul 12 00:26:20.977733 env[1733]: 2025-07-12 00:26:20.847 [INFO][5193] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a" Jul 12 00:26:20.977733 env[1733]: 2025-07-12 00:26:20.847 [INFO][5193] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a" Jul 12 00:26:20.977733 env[1733]: 2025-07-12 00:26:20.953 [INFO][5200] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a" HandleID="k8s-pod-network.25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a" Workload="ip--172--31--26--167-k8s-whisker--694fcf6c96--9tks2-eth0" Jul 12 00:26:20.977733 env[1733]: 2025-07-12 00:26:20.953 [INFO][5200] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 12 00:26:20.977733 env[1733]: 2025-07-12 00:26:20.953 [INFO][5200] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 12 00:26:20.977733 env[1733]: 2025-07-12 00:26:20.969 [WARNING][5200] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a" HandleID="k8s-pod-network.25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a" Workload="ip--172--31--26--167-k8s-whisker--694fcf6c96--9tks2-eth0" Jul 12 00:26:20.977733 env[1733]: 2025-07-12 00:26:20.969 [INFO][5200] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a" HandleID="k8s-pod-network.25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a" Workload="ip--172--31--26--167-k8s-whisker--694fcf6c96--9tks2-eth0" Jul 12 00:26:20.977733 env[1733]: 2025-07-12 00:26:20.972 [INFO][5200] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 12 00:26:20.977733 env[1733]: 2025-07-12 00:26:20.974 [INFO][5193] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a" Jul 12 00:26:20.978866 env[1733]: time="2025-07-12T00:26:20.978800767Z" level=info msg="TearDown network for sandbox \"25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a\" successfully" Jul 12 00:26:20.978969 env[1733]: time="2025-07-12T00:26:20.978861103Z" level=info msg="StopPodSandbox for \"25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a\" returns successfully" Jul 12 00:26:20.979735 env[1733]: time="2025-07-12T00:26:20.979655553Z" level=info msg="RemovePodSandbox for \"25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a\"" Jul 12 00:26:20.979975 env[1733]: time="2025-07-12T00:26:20.979915006Z" level=info msg="Forcibly stopping sandbox \"25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a\"" Jul 12 00:26:21.194854 env[1733]: 2025-07-12 00:26:21.100 [WARNING][5215] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a" WorkloadEndpoint="ip--172--31--26--167-k8s-whisker--694fcf6c96--9tks2-eth0" Jul 12 00:26:21.194854 env[1733]: 2025-07-12 00:26:21.100 [INFO][5215] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a" Jul 12 00:26:21.194854 env[1733]: 2025-07-12 00:26:21.100 [INFO][5215] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a" iface="eth0" netns="" Jul 12 00:26:21.194854 env[1733]: 2025-07-12 00:26:21.100 [INFO][5215] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a" Jul 12 00:26:21.194854 env[1733]: 2025-07-12 00:26:21.100 [INFO][5215] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a" Jul 12 00:26:21.194854 env[1733]: 2025-07-12 00:26:21.161 [INFO][5222] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a" HandleID="k8s-pod-network.25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a" Workload="ip--172--31--26--167-k8s-whisker--694fcf6c96--9tks2-eth0" Jul 12 00:26:21.194854 env[1733]: 2025-07-12 00:26:21.162 [INFO][5222] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 12 00:26:21.194854 env[1733]: 2025-07-12 00:26:21.162 [INFO][5222] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 12 00:26:21.194854 env[1733]: 2025-07-12 00:26:21.186 [WARNING][5222] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a" HandleID="k8s-pod-network.25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a" Workload="ip--172--31--26--167-k8s-whisker--694fcf6c96--9tks2-eth0" Jul 12 00:26:21.194854 env[1733]: 2025-07-12 00:26:21.186 [INFO][5222] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a" HandleID="k8s-pod-network.25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a" Workload="ip--172--31--26--167-k8s-whisker--694fcf6c96--9tks2-eth0" Jul 12 00:26:21.194854 env[1733]: 2025-07-12 00:26:21.189 [INFO][5222] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 12 00:26:21.194854 env[1733]: 2025-07-12 00:26:21.191 [INFO][5215] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a" Jul 12 00:26:21.196116 env[1733]: time="2025-07-12T00:26:21.195872632Z" level=info msg="TearDown network for sandbox \"25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a\" successfully" Jul 12 00:26:21.202314 env[1733]: time="2025-07-12T00:26:21.202242535Z" level=info msg="RemovePodSandbox \"25d2ce099a31582c8df78c09d413acc0f95e350d7575e0fe4732213dc5d9e30a\" returns successfully" Jul 12 00:26:21.203300 env[1733]: time="2025-07-12T00:26:21.203209115Z" level=info msg="StopPodSandbox for \"808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26\"" Jul 12 00:26:21.407075 env[1733]: 2025-07-12 00:26:21.327 [WARNING][5239] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--167-k8s-goldmane--58fd7646b9--rmlz5-eth0", GenerateName:"goldmane-58fd7646b9-", Namespace:"calico-system", SelfLink:"", UID:"1de9e718-b4cc-4c55-aca5-2a9b50b71c00", ResourceVersion:"948", Generation:0, CreationTimestamp:time.Date(2025, time.July, 12, 0, 25, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"58fd7646b9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-167", ContainerID:"51262c9ac632bb37d5bb70bebe6ec597ad86ed7fa070d532cfa587c8f7cf7b13", Pod:"goldmane-58fd7646b9-rmlz5", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.69.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali186ed149bf2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 12 00:26:21.407075 env[1733]: 2025-07-12 00:26:21.328 [INFO][5239] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26" Jul 12 00:26:21.407075 env[1733]: 2025-07-12 00:26:21.328 [INFO][5239] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26" iface="eth0" netns="" Jul 12 00:26:21.407075 env[1733]: 2025-07-12 00:26:21.328 [INFO][5239] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26" Jul 12 00:26:21.407075 env[1733]: 2025-07-12 00:26:21.328 [INFO][5239] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26" Jul 12 00:26:21.407075 env[1733]: 2025-07-12 00:26:21.380 [INFO][5246] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26" HandleID="k8s-pod-network.808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26" Workload="ip--172--31--26--167-k8s-goldmane--58fd7646b9--rmlz5-eth0" Jul 12 00:26:21.407075 env[1733]: 2025-07-12 00:26:21.381 [INFO][5246] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 12 00:26:21.407075 env[1733]: 2025-07-12 00:26:21.381 [INFO][5246] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 12 00:26:21.407075 env[1733]: 2025-07-12 00:26:21.396 [WARNING][5246] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26" HandleID="k8s-pod-network.808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26" Workload="ip--172--31--26--167-k8s-goldmane--58fd7646b9--rmlz5-eth0" Jul 12 00:26:21.407075 env[1733]: 2025-07-12 00:26:21.396 [INFO][5246] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26" HandleID="k8s-pod-network.808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26" Workload="ip--172--31--26--167-k8s-goldmane--58fd7646b9--rmlz5-eth0" Jul 12 00:26:21.407075 env[1733]: 2025-07-12 00:26:21.400 [INFO][5246] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 12 00:26:21.407075 env[1733]: 2025-07-12 00:26:21.403 [INFO][5239] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26" Jul 12 00:26:21.408541 env[1733]: time="2025-07-12T00:26:21.407105664Z" level=info msg="TearDown network for sandbox \"808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26\" successfully" Jul 12 00:26:21.408541 env[1733]: time="2025-07-12T00:26:21.407150280Z" level=info msg="StopPodSandbox for \"808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26\" returns successfully" Jul 12 00:26:21.409090 env[1733]: time="2025-07-12T00:26:21.408979952Z" level=info msg="RemovePodSandbox for \"808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26\"" Jul 12 00:26:21.409286 env[1733]: time="2025-07-12T00:26:21.409218609Z" level=info msg="Forcibly stopping sandbox \"808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26\"" Jul 12 00:26:21.614435 env[1733]: time="2025-07-12T00:26:21.614316171Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:26:21.621514 env[1733]: time="2025-07-12T00:26:21.621420165Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3371ea1b18040228ef58c964e49b96f4291def748753dfbc0aef87a55f906b8f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:26:21.630025 env[1733]: time="2025-07-12T00:26:21.629220979Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:26:21.632824 env[1733]: time="2025-07-12T00:26:21.632767822Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ec6b10660962e7caad70c47755049fad68f9fc2f7064e8bc7cb862583e02cc2b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:26:21.634092 env[1733]: time="2025-07-12T00:26:21.633780170Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.2\" returns image reference \"sha256:3371ea1b18040228ef58c964e49b96f4291def748753dfbc0aef87a55f906b8f\"" Jul 12 00:26:21.640985 env[1733]: time="2025-07-12T00:26:21.640915689Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.2\"" Jul 12 00:26:21.643345 env[1733]: time="2025-07-12T00:26:21.643251907Z" level=info msg="CreateContainer within sandbox \"e337c4de4667bcfe99f8ff8a5ce4df49f8959b57d38965c959864e610bc21761\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Jul 12 00:26:21.695767 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount594858495.mount: Deactivated successfully. Jul 12 00:26:21.701983 env[1733]: 2025-07-12 00:26:21.536 [WARNING][5262] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--167-k8s-goldmane--58fd7646b9--rmlz5-eth0", GenerateName:"goldmane-58fd7646b9-", Namespace:"calico-system", SelfLink:"", UID:"1de9e718-b4cc-4c55-aca5-2a9b50b71c00", ResourceVersion:"948", Generation:0, CreationTimestamp:time.Date(2025, time.July, 12, 0, 25, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"58fd7646b9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-167", ContainerID:"51262c9ac632bb37d5bb70bebe6ec597ad86ed7fa070d532cfa587c8f7cf7b13", Pod:"goldmane-58fd7646b9-rmlz5", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.69.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali186ed149bf2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 12 00:26:21.701983 env[1733]: 2025-07-12 00:26:21.537 [INFO][5262] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26" Jul 12 00:26:21.701983 env[1733]: 2025-07-12 00:26:21.537 [INFO][5262] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26" iface="eth0" netns="" Jul 12 00:26:21.701983 env[1733]: 2025-07-12 00:26:21.537 [INFO][5262] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26" Jul 12 00:26:21.701983 env[1733]: 2025-07-12 00:26:21.537 [INFO][5262] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26" Jul 12 00:26:21.701983 env[1733]: 2025-07-12 00:26:21.622 [INFO][5269] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26" HandleID="k8s-pod-network.808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26" Workload="ip--172--31--26--167-k8s-goldmane--58fd7646b9--rmlz5-eth0" Jul 12 00:26:21.701983 env[1733]: 2025-07-12 00:26:21.622 [INFO][5269] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 12 00:26:21.701983 env[1733]: 2025-07-12 00:26:21.622 [INFO][5269] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 12 00:26:21.701983 env[1733]: 2025-07-12 00:26:21.666 [WARNING][5269] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26" HandleID="k8s-pod-network.808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26" Workload="ip--172--31--26--167-k8s-goldmane--58fd7646b9--rmlz5-eth0" Jul 12 00:26:21.701983 env[1733]: 2025-07-12 00:26:21.666 [INFO][5269] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26" HandleID="k8s-pod-network.808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26" Workload="ip--172--31--26--167-k8s-goldmane--58fd7646b9--rmlz5-eth0" Jul 12 00:26:21.701983 env[1733]: 2025-07-12 00:26:21.686 [INFO][5269] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 12 00:26:21.701983 env[1733]: 2025-07-12 00:26:21.692 [INFO][5262] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26" Jul 12 00:26:21.703619 env[1733]: time="2025-07-12T00:26:21.703571186Z" level=info msg="TearDown network for sandbox \"808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26\" successfully" Jul 12 00:26:21.714167 env[1733]: time="2025-07-12T00:26:21.714029483Z" level=info msg="CreateContainer within sandbox \"e337c4de4667bcfe99f8ff8a5ce4df49f8959b57d38965c959864e610bc21761\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"1f90354643d1fb71407ec9089a4be861e6f9bb85a14460f43fbc328e380b8e58\"" Jul 12 00:26:21.716070 env[1733]: time="2025-07-12T00:26:21.715989764Z" level=info msg="StartContainer for \"1f90354643d1fb71407ec9089a4be861e6f9bb85a14460f43fbc328e380b8e58\"" Jul 12 00:26:21.718552 env[1733]: time="2025-07-12T00:26:21.718400550Z" level=info msg="RemovePodSandbox \"808e1e9f932e3d14ebaa5e5d4d5be004b23abaa5d2e8daa8ada0a66ab490bf26\" returns successfully" Jul 12 00:26:21.719905 env[1733]: time="2025-07-12T00:26:21.719780988Z" level=info msg="StopPodSandbox for \"0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7\"" Jul 12 00:26:21.782389 systemd[1]: Started cri-containerd-1f90354643d1fb71407ec9089a4be861e6f9bb85a14460f43fbc328e380b8e58.scope. Jul 12 00:26:21.808307 systemd[1]: run-containerd-runc-k8s.io-1f90354643d1fb71407ec9089a4be861e6f9bb85a14460f43fbc328e380b8e58-runc.TBTeNt.mount: Deactivated successfully. Jul 12 00:26:21.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:21.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:21.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:21.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:21.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:21.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:21.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:21.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:21.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:21.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:21.902000 audit: BPF prog-id=208 op=LOAD Jul 12 00:26:21.903000 audit[5297]: AVC avc: denied { bpf } for pid=5297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:21.903000 audit[5297]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4332 pid=5297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:21.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166393033353436343364316662373134303765633930383961346265 Jul 12 00:26:21.903000 audit[5297]: AVC avc: denied { perfmon } for pid=5297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:21.903000 audit[5297]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4332 pid=5297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:21.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166393033353436343364316662373134303765633930383961346265 Jul 12 00:26:21.903000 audit[5297]: AVC avc: denied { bpf } for pid=5297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:21.903000 audit[5297]: AVC avc: denied { bpf } for pid=5297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:21.903000 audit[5297]: AVC avc: denied { bpf } for pid=5297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:21.903000 audit[5297]: AVC avc: denied { perfmon } for pid=5297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:21.903000 audit[5297]: AVC avc: denied { perfmon } for pid=5297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:21.903000 audit[5297]: AVC avc: denied { perfmon } for pid=5297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:21.903000 audit[5297]: AVC avc: denied { perfmon } for pid=5297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:21.903000 audit[5297]: AVC avc: denied { perfmon } for pid=5297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:21.903000 audit[5297]: AVC avc: denied { bpf } for pid=5297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:21.903000 audit[5297]: AVC avc: denied { bpf } for pid=5297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:21.903000 audit: BPF prog-id=209 op=LOAD Jul 12 00:26:21.903000 audit[5297]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4332 pid=5297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:21.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166393033353436343364316662373134303765633930383961346265 Jul 12 00:26:21.904000 audit[5297]: AVC avc: denied { bpf } for pid=5297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:21.904000 audit[5297]: AVC avc: denied { bpf } for pid=5297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:21.904000 audit[5297]: AVC avc: denied { perfmon } for pid=5297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:21.904000 audit[5297]: AVC avc: denied { perfmon } for pid=5297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:21.904000 audit[5297]: AVC avc: denied { perfmon } for pid=5297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:21.904000 audit[5297]: AVC avc: denied { perfmon } for pid=5297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:21.904000 audit[5297]: AVC avc: denied { perfmon } for pid=5297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:21.904000 audit[5297]: AVC avc: denied { bpf } for pid=5297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:21.904000 audit[5297]: AVC avc: denied { bpf } for pid=5297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:21.904000 audit: BPF prog-id=210 op=LOAD Jul 12 00:26:21.904000 audit[5297]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4332 pid=5297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:21.904000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166393033353436343364316662373134303765633930383961346265 Jul 12 00:26:21.904000 audit: BPF prog-id=210 op=UNLOAD Jul 12 00:26:21.904000 audit: BPF prog-id=209 op=UNLOAD Jul 12 00:26:21.904000 audit[5297]: AVC avc: denied { bpf } for pid=5297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:21.904000 audit[5297]: AVC avc: denied { bpf } for pid=5297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:21.904000 audit[5297]: AVC avc: denied { bpf } for pid=5297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:21.904000 audit[5297]: AVC avc: denied { perfmon } for pid=5297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:21.904000 audit[5297]: AVC avc: denied { perfmon } for pid=5297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:21.904000 audit[5297]: AVC avc: denied { perfmon } for pid=5297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:21.904000 audit[5297]: AVC avc: denied { perfmon } for pid=5297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:21.904000 audit[5297]: AVC avc: denied { perfmon } for pid=5297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:21.904000 audit[5297]: AVC avc: denied { bpf } for pid=5297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:21.904000 audit[5297]: AVC avc: denied { bpf } for pid=5297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:21.904000 audit: BPF prog-id=211 op=LOAD Jul 12 00:26:21.904000 audit[5297]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4332 pid=5297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:21.904000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166393033353436343364316662373134303765633930383961346265 Jul 12 00:26:21.945357 env[1733]: 2025-07-12 00:26:21.846 [WARNING][5292] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--167-k8s-csi--node--driver--grn85-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"be5845dd-212b-4b4e-b99b-9489c28f56b4", ResourceVersion:"992", Generation:0, CreationTimestamp:time.Date(2025, time.July, 12, 0, 25, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"57bd658777", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-167", ContainerID:"704bdc0ab1f385b6a10a8cb91563ebe794cd367e6f6f40c6830d6bf532f3ed91", Pod:"csi-node-driver-grn85", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.69.200/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali057d08134e9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 12 00:26:21.945357 env[1733]: 2025-07-12 00:26:21.846 [INFO][5292] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7" Jul 12 00:26:21.945357 env[1733]: 2025-07-12 00:26:21.847 [INFO][5292] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7" iface="eth0" netns="" Jul 12 00:26:21.945357 env[1733]: 2025-07-12 00:26:21.847 [INFO][5292] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7" Jul 12 00:26:21.945357 env[1733]: 2025-07-12 00:26:21.847 [INFO][5292] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7" Jul 12 00:26:21.945357 env[1733]: 2025-07-12 00:26:21.909 [INFO][5311] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7" HandleID="k8s-pod-network.0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7" Workload="ip--172--31--26--167-k8s-csi--node--driver--grn85-eth0" Jul 12 00:26:21.945357 env[1733]: 2025-07-12 00:26:21.909 [INFO][5311] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 12 00:26:21.945357 env[1733]: 2025-07-12 00:26:21.909 [INFO][5311] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 12 00:26:21.945357 env[1733]: 2025-07-12 00:26:21.925 [WARNING][5311] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7" HandleID="k8s-pod-network.0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7" Workload="ip--172--31--26--167-k8s-csi--node--driver--grn85-eth0" Jul 12 00:26:21.945357 env[1733]: 2025-07-12 00:26:21.925 [INFO][5311] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7" HandleID="k8s-pod-network.0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7" Workload="ip--172--31--26--167-k8s-csi--node--driver--grn85-eth0" Jul 12 00:26:21.945357 env[1733]: 2025-07-12 00:26:21.932 [INFO][5311] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 12 00:26:21.945357 env[1733]: 2025-07-12 00:26:21.940 [INFO][5292] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7" Jul 12 00:26:21.946791 env[1733]: time="2025-07-12T00:26:21.946733524Z" level=info msg="TearDown network for sandbox \"0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7\" successfully" Jul 12 00:26:21.947064 env[1733]: time="2025-07-12T00:26:21.947005205Z" level=info msg="StopPodSandbox for \"0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7\" returns successfully" Jul 12 00:26:21.950461 env[1733]: time="2025-07-12T00:26:21.950316115Z" level=info msg="RemovePodSandbox for \"0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7\"" Jul 12 00:26:21.951157 env[1733]: time="2025-07-12T00:26:21.951066598Z" level=info msg="Forcibly stopping sandbox \"0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7\"" Jul 12 00:26:21.984998 env[1733]: time="2025-07-12T00:26:21.984918504Z" level=info msg="StartContainer for \"1f90354643d1fb71407ec9089a4be861e6f9bb85a14460f43fbc328e380b8e58\" returns successfully" Jul 12 00:26:22.134860 env[1733]: 2025-07-12 00:26:22.063 [WARNING][5337] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--167-k8s-csi--node--driver--grn85-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"be5845dd-212b-4b4e-b99b-9489c28f56b4", ResourceVersion:"992", Generation:0, CreationTimestamp:time.Date(2025, time.July, 12, 0, 25, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"57bd658777", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-167", ContainerID:"704bdc0ab1f385b6a10a8cb91563ebe794cd367e6f6f40c6830d6bf532f3ed91", Pod:"csi-node-driver-grn85", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.69.200/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali057d08134e9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 12 00:26:22.134860 env[1733]: 2025-07-12 00:26:22.063 [INFO][5337] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7" Jul 12 00:26:22.134860 env[1733]: 2025-07-12 00:26:22.063 [INFO][5337] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7" iface="eth0" netns="" Jul 12 00:26:22.134860 env[1733]: 2025-07-12 00:26:22.064 [INFO][5337] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7" Jul 12 00:26:22.134860 env[1733]: 2025-07-12 00:26:22.064 [INFO][5337] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7" Jul 12 00:26:22.134860 env[1733]: 2025-07-12 00:26:22.110 [INFO][5348] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7" HandleID="k8s-pod-network.0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7" Workload="ip--172--31--26--167-k8s-csi--node--driver--grn85-eth0" Jul 12 00:26:22.134860 env[1733]: 2025-07-12 00:26:22.110 [INFO][5348] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 12 00:26:22.134860 env[1733]: 2025-07-12 00:26:22.111 [INFO][5348] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 12 00:26:22.134860 env[1733]: 2025-07-12 00:26:22.126 [WARNING][5348] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7" HandleID="k8s-pod-network.0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7" Workload="ip--172--31--26--167-k8s-csi--node--driver--grn85-eth0" Jul 12 00:26:22.134860 env[1733]: 2025-07-12 00:26:22.126 [INFO][5348] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7" HandleID="k8s-pod-network.0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7" Workload="ip--172--31--26--167-k8s-csi--node--driver--grn85-eth0" Jul 12 00:26:22.134860 env[1733]: 2025-07-12 00:26:22.129 [INFO][5348] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 12 00:26:22.134860 env[1733]: 2025-07-12 00:26:22.131 [INFO][5337] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7" Jul 12 00:26:22.136028 env[1733]: time="2025-07-12T00:26:22.135977028Z" level=info msg="TearDown network for sandbox \"0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7\" successfully" Jul 12 00:26:22.143998 env[1733]: time="2025-07-12T00:26:22.143935990Z" level=info msg="RemovePodSandbox \"0c554155f53029fb7c65070825752afbd5c54a17f32edabbfdd76e2252b1fcf7\" returns successfully" Jul 12 00:26:22.144956 env[1733]: time="2025-07-12T00:26:22.144911511Z" level=info msg="StopPodSandbox for \"10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8\"" Jul 12 00:26:22.298090 env[1733]: 2025-07-12 00:26:22.216 [WARNING][5362] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--kx5cn-eth0", GenerateName:"calico-apiserver-b5644b9bf-", Namespace:"calico-apiserver", SelfLink:"", UID:"e3812f81-11a9-4dfb-a0f5-cf6c3ca45a4d", ResourceVersion:"954", Generation:0, CreationTimestamp:time.Date(2025, time.July, 12, 0, 25, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"b5644b9bf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-167", ContainerID:"bc2545c9dcd60547a2ee8cc577172be3bee080d7a2f340c748a8ca6028d558a9", Pod:"calico-apiserver-b5644b9bf-kx5cn", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.69.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali383ea7bdef1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 12 00:26:22.298090 env[1733]: 2025-07-12 00:26:22.216 [INFO][5362] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8" Jul 12 00:26:22.298090 env[1733]: 2025-07-12 00:26:22.216 [INFO][5362] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8" iface="eth0" netns="" Jul 12 00:26:22.298090 env[1733]: 2025-07-12 00:26:22.216 [INFO][5362] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8" Jul 12 00:26:22.298090 env[1733]: 2025-07-12 00:26:22.216 [INFO][5362] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8" Jul 12 00:26:22.298090 env[1733]: 2025-07-12 00:26:22.275 [INFO][5374] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8" HandleID="k8s-pod-network.10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8" Workload="ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--kx5cn-eth0" Jul 12 00:26:22.298090 env[1733]: 2025-07-12 00:26:22.275 [INFO][5374] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 12 00:26:22.298090 env[1733]: 2025-07-12 00:26:22.275 [INFO][5374] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 12 00:26:22.298090 env[1733]: 2025-07-12 00:26:22.289 [WARNING][5374] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8" HandleID="k8s-pod-network.10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8" Workload="ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--kx5cn-eth0" Jul 12 00:26:22.298090 env[1733]: 2025-07-12 00:26:22.289 [INFO][5374] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8" HandleID="k8s-pod-network.10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8" Workload="ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--kx5cn-eth0" Jul 12 00:26:22.298090 env[1733]: 2025-07-12 00:26:22.292 [INFO][5374] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 12 00:26:22.298090 env[1733]: 2025-07-12 00:26:22.294 [INFO][5362] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8" Jul 12 00:26:22.301049 env[1733]: time="2025-07-12T00:26:22.298040082Z" level=info msg="TearDown network for sandbox \"10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8\" successfully" Jul 12 00:26:22.301264 env[1733]: time="2025-07-12T00:26:22.301040987Z" level=info msg="StopPodSandbox for \"10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8\" returns successfully" Jul 12 00:26:22.301815 env[1733]: time="2025-07-12T00:26:22.301761388Z" level=info msg="RemovePodSandbox for \"10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8\"" Jul 12 00:26:22.301941 env[1733]: time="2025-07-12T00:26:22.301824244Z" level=info msg="Forcibly stopping sandbox \"10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8\"" Jul 12 00:26:22.471755 env[1733]: 2025-07-12 00:26:22.397 [WARNING][5389] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--kx5cn-eth0", GenerateName:"calico-apiserver-b5644b9bf-", Namespace:"calico-apiserver", SelfLink:"", UID:"e3812f81-11a9-4dfb-a0f5-cf6c3ca45a4d", ResourceVersion:"954", Generation:0, CreationTimestamp:time.Date(2025, time.July, 12, 0, 25, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"b5644b9bf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-167", ContainerID:"bc2545c9dcd60547a2ee8cc577172be3bee080d7a2f340c748a8ca6028d558a9", Pod:"calico-apiserver-b5644b9bf-kx5cn", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.69.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali383ea7bdef1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 12 00:26:22.471755 env[1733]: 2025-07-12 00:26:22.398 [INFO][5389] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8" Jul 12 00:26:22.471755 env[1733]: 2025-07-12 00:26:22.399 [INFO][5389] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8" iface="eth0" netns="" Jul 12 00:26:22.471755 env[1733]: 2025-07-12 00:26:22.399 [INFO][5389] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8" Jul 12 00:26:22.471755 env[1733]: 2025-07-12 00:26:22.399 [INFO][5389] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8" Jul 12 00:26:22.471755 env[1733]: 2025-07-12 00:26:22.447 [INFO][5397] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8" HandleID="k8s-pod-network.10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8" Workload="ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--kx5cn-eth0" Jul 12 00:26:22.471755 env[1733]: 2025-07-12 00:26:22.447 [INFO][5397] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 12 00:26:22.471755 env[1733]: 2025-07-12 00:26:22.447 [INFO][5397] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 12 00:26:22.471755 env[1733]: 2025-07-12 00:26:22.463 [WARNING][5397] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8" HandleID="k8s-pod-network.10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8" Workload="ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--kx5cn-eth0" Jul 12 00:26:22.471755 env[1733]: 2025-07-12 00:26:22.463 [INFO][5397] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8" HandleID="k8s-pod-network.10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8" Workload="ip--172--31--26--167-k8s-calico--apiserver--b5644b9bf--kx5cn-eth0" Jul 12 00:26:22.471755 env[1733]: 2025-07-12 00:26:22.466 [INFO][5397] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 12 00:26:22.471755 env[1733]: 2025-07-12 00:26:22.468 [INFO][5389] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8" Jul 12 00:26:22.472945 env[1733]: time="2025-07-12T00:26:22.472886606Z" level=info msg="TearDown network for sandbox \"10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8\" successfully" Jul 12 00:26:22.480220 env[1733]: time="2025-07-12T00:26:22.480110659Z" level=info msg="RemovePodSandbox \"10fa511df98cea4aec6f21c53c7d22bd2a05ff66185b3c3da735e88a184335d8\" returns successfully" Jul 12 00:26:22.481233 env[1733]: time="2025-07-12T00:26:22.481169413Z" level=info msg="StopPodSandbox for \"6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b\"" Jul 12 00:26:22.715259 env[1733]: 2025-07-12 00:26:22.590 [WARNING][5411] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--167-k8s-calico--kube--controllers--5c48f86fdd--72x89-eth0", GenerateName:"calico-kube-controllers-5c48f86fdd-", Namespace:"calico-system", SelfLink:"", UID:"7c6c2194-2c72-4a54-9fb8-bf2e357a0987", ResourceVersion:"961", Generation:0, CreationTimestamp:time.Date(2025, time.July, 12, 0, 25, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5c48f86fdd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-167", ContainerID:"bf666321dcec7f436fe286592b857e4d01fb78b02262c76d77d8e7787d7a322d", Pod:"calico-kube-controllers-5c48f86fdd-72x89", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.69.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4cbba91ec76", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 12 00:26:22.715259 env[1733]: 2025-07-12 00:26:22.590 [INFO][5411] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b" Jul 12 00:26:22.715259 env[1733]: 2025-07-12 00:26:22.590 [INFO][5411] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b" iface="eth0" netns="" Jul 12 00:26:22.715259 env[1733]: 2025-07-12 00:26:22.590 [INFO][5411] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b" Jul 12 00:26:22.715259 env[1733]: 2025-07-12 00:26:22.590 [INFO][5411] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b" Jul 12 00:26:22.715259 env[1733]: 2025-07-12 00:26:22.664 [INFO][5418] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b" HandleID="k8s-pod-network.6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b" Workload="ip--172--31--26--167-k8s-calico--kube--controllers--5c48f86fdd--72x89-eth0" Jul 12 00:26:22.715259 env[1733]: 2025-07-12 00:26:22.666 [INFO][5418] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 12 00:26:22.715259 env[1733]: 2025-07-12 00:26:22.667 [INFO][5418] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 12 00:26:22.715259 env[1733]: 2025-07-12 00:26:22.694 [WARNING][5418] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b" HandleID="k8s-pod-network.6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b" Workload="ip--172--31--26--167-k8s-calico--kube--controllers--5c48f86fdd--72x89-eth0" Jul 12 00:26:22.715259 env[1733]: 2025-07-12 00:26:22.694 [INFO][5418] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b" HandleID="k8s-pod-network.6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b" Workload="ip--172--31--26--167-k8s-calico--kube--controllers--5c48f86fdd--72x89-eth0" Jul 12 00:26:22.715259 env[1733]: 2025-07-12 00:26:22.698 [INFO][5418] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 12 00:26:22.715259 env[1733]: 2025-07-12 00:26:22.702 [INFO][5411] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b" Jul 12 00:26:22.715259 env[1733]: time="2025-07-12T00:26:22.715128864Z" level=info msg="TearDown network for sandbox \"6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b\" successfully" Jul 12 00:26:22.715259 env[1733]: time="2025-07-12T00:26:22.715170132Z" level=info msg="StopPodSandbox for \"6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b\" returns successfully" Jul 12 00:26:22.717118 env[1733]: time="2025-07-12T00:26:22.717050339Z" level=info msg="RemovePodSandbox for \"6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b\"" Jul 12 00:26:22.717258 env[1733]: time="2025-07-12T00:26:22.717118439Z" level=info msg="Forcibly stopping sandbox \"6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b\"" Jul 12 00:26:22.758282 kubelet[2742]: I0712 00:26:22.757771 2742 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-b5644b9bf-tg2s7" podStartSLOduration=35.395465006 podStartE2EDuration="42.757748524s" podCreationTimestamp="2025-07-12 00:25:40 +0000 UTC" firstStartedPulling="2025-07-12 00:26:14.27699474 +0000 UTC m=+55.420973982" lastFinishedPulling="2025-07-12 00:26:21.639278174 +0000 UTC m=+62.783257500" observedRunningTime="2025-07-12 00:26:22.757488063 +0000 UTC m=+63.901467341" watchObservedRunningTime="2025-07-12 00:26:22.757748524 +0000 UTC m=+63.901727766" Jul 12 00:26:22.817000 audit[5438]: NETFILTER_CFG table=filter:118 family=2 entries=14 op=nft_register_rule pid=5438 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:26:22.817000 audit[5438]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffd8a954f0 a2=0 a3=1 items=0 ppid=2843 pid=5438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:22.817000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:26:22.824000 audit[5438]: NETFILTER_CFG table=nat:119 family=2 entries=20 op=nft_register_rule pid=5438 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:26:22.824000 audit[5438]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffd8a954f0 a2=0 a3=1 items=0 ppid=2843 pid=5438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:22.824000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:26:23.060056 env[1733]: 2025-07-12 00:26:22.917 [WARNING][5433] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--167-k8s-calico--kube--controllers--5c48f86fdd--72x89-eth0", GenerateName:"calico-kube-controllers-5c48f86fdd-", Namespace:"calico-system", SelfLink:"", UID:"7c6c2194-2c72-4a54-9fb8-bf2e357a0987", ResourceVersion:"961", Generation:0, CreationTimestamp:time.Date(2025, time.July, 12, 0, 25, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5c48f86fdd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-167", ContainerID:"bf666321dcec7f436fe286592b857e4d01fb78b02262c76d77d8e7787d7a322d", Pod:"calico-kube-controllers-5c48f86fdd-72x89", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.69.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4cbba91ec76", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 12 00:26:23.060056 env[1733]: 2025-07-12 00:26:22.917 [INFO][5433] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b" Jul 12 00:26:23.060056 env[1733]: 2025-07-12 00:26:22.917 [INFO][5433] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b" iface="eth0" netns="" Jul 12 00:26:23.060056 env[1733]: 2025-07-12 00:26:22.917 [INFO][5433] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b" Jul 12 00:26:23.060056 env[1733]: 2025-07-12 00:26:22.918 [INFO][5433] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b" Jul 12 00:26:23.060056 env[1733]: 2025-07-12 00:26:23.021 [INFO][5442] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b" HandleID="k8s-pod-network.6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b" Workload="ip--172--31--26--167-k8s-calico--kube--controllers--5c48f86fdd--72x89-eth0" Jul 12 00:26:23.060056 env[1733]: 2025-07-12 00:26:23.021 [INFO][5442] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 12 00:26:23.060056 env[1733]: 2025-07-12 00:26:23.022 [INFO][5442] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 12 00:26:23.060056 env[1733]: 2025-07-12 00:26:23.047 [WARNING][5442] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b" HandleID="k8s-pod-network.6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b" Workload="ip--172--31--26--167-k8s-calico--kube--controllers--5c48f86fdd--72x89-eth0" Jul 12 00:26:23.060056 env[1733]: 2025-07-12 00:26:23.048 [INFO][5442] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b" HandleID="k8s-pod-network.6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b" Workload="ip--172--31--26--167-k8s-calico--kube--controllers--5c48f86fdd--72x89-eth0" Jul 12 00:26:23.060056 env[1733]: 2025-07-12 00:26:23.053 [INFO][5442] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 12 00:26:23.060056 env[1733]: 2025-07-12 00:26:23.056 [INFO][5433] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b" Jul 12 00:26:23.061302 env[1733]: time="2025-07-12T00:26:23.060017754Z" level=info msg="TearDown network for sandbox \"6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b\" successfully" Jul 12 00:26:23.140013 env[1733]: time="2025-07-12T00:26:23.139941036Z" level=info msg="RemovePodSandbox \"6ba5dac565aa9fb14827509be77d53bd57572604fa6f356d0ba216203e1e601b\" returns successfully" Jul 12 00:26:23.141096 env[1733]: time="2025-07-12T00:26:23.141052940Z" level=info msg="StopPodSandbox for \"13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd\"" Jul 12 00:26:23.404079 env[1733]: 2025-07-12 00:26:23.284 [WARNING][5456] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--167-k8s-coredns--7c65d6cfc9--rtg8v-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"4f42c96b-24be-48e4-ba92-a05f74184848", ResourceVersion:"974", Generation:0, CreationTimestamp:time.Date(2025, time.July, 12, 0, 25, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-167", ContainerID:"77f1f75d1159c36709fa225bb17fcdabe9a6cef1c6191891758e7b75bef618ee", Pod:"coredns-7c65d6cfc9-rtg8v", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.69.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6048bf267e3", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 12 00:26:23.404079 env[1733]: 2025-07-12 00:26:23.285 [INFO][5456] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd" Jul 12 00:26:23.404079 env[1733]: 2025-07-12 00:26:23.285 [INFO][5456] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd" iface="eth0" netns="" Jul 12 00:26:23.404079 env[1733]: 2025-07-12 00:26:23.285 [INFO][5456] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd" Jul 12 00:26:23.404079 env[1733]: 2025-07-12 00:26:23.285 [INFO][5456] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd" Jul 12 00:26:23.404079 env[1733]: 2025-07-12 00:26:23.376 [INFO][5463] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd" HandleID="k8s-pod-network.13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd" Workload="ip--172--31--26--167-k8s-coredns--7c65d6cfc9--rtg8v-eth0" Jul 12 00:26:23.404079 env[1733]: 2025-07-12 00:26:23.377 [INFO][5463] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 12 00:26:23.404079 env[1733]: 2025-07-12 00:26:23.377 [INFO][5463] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 12 00:26:23.404079 env[1733]: 2025-07-12 00:26:23.394 [WARNING][5463] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd" HandleID="k8s-pod-network.13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd" Workload="ip--172--31--26--167-k8s-coredns--7c65d6cfc9--rtg8v-eth0" Jul 12 00:26:23.404079 env[1733]: 2025-07-12 00:26:23.394 [INFO][5463] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd" HandleID="k8s-pod-network.13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd" Workload="ip--172--31--26--167-k8s-coredns--7c65d6cfc9--rtg8v-eth0" Jul 12 00:26:23.404079 env[1733]: 2025-07-12 00:26:23.398 [INFO][5463] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 12 00:26:23.404079 env[1733]: 2025-07-12 00:26:23.401 [INFO][5456] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd" Jul 12 00:26:23.405549 env[1733]: time="2025-07-12T00:26:23.405495154Z" level=info msg="TearDown network for sandbox \"13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd\" successfully" Jul 12 00:26:23.405721 env[1733]: time="2025-07-12T00:26:23.405651731Z" level=info msg="StopPodSandbox for \"13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd\" returns successfully" Jul 12 00:26:23.408382 env[1733]: time="2025-07-12T00:26:23.408332574Z" level=info msg="RemovePodSandbox for \"13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd\"" Jul 12 00:26:23.408668 env[1733]: time="2025-07-12T00:26:23.408602672Z" level=info msg="Forcibly stopping sandbox \"13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd\"" Jul 12 00:26:23.674905 env[1733]: 2025-07-12 00:26:23.553 [WARNING][5477] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--167-k8s-coredns--7c65d6cfc9--rtg8v-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"4f42c96b-24be-48e4-ba92-a05f74184848", ResourceVersion:"974", Generation:0, CreationTimestamp:time.Date(2025, time.July, 12, 0, 25, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-167", ContainerID:"77f1f75d1159c36709fa225bb17fcdabe9a6cef1c6191891758e7b75bef618ee", Pod:"coredns-7c65d6cfc9-rtg8v", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.69.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6048bf267e3", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 12 00:26:23.674905 env[1733]: 2025-07-12 00:26:23.554 [INFO][5477] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd" Jul 12 00:26:23.674905 env[1733]: 2025-07-12 00:26:23.554 [INFO][5477] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd" iface="eth0" netns="" Jul 12 00:26:23.674905 env[1733]: 2025-07-12 00:26:23.554 [INFO][5477] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd" Jul 12 00:26:23.674905 env[1733]: 2025-07-12 00:26:23.554 [INFO][5477] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd" Jul 12 00:26:23.674905 env[1733]: 2025-07-12 00:26:23.639 [INFO][5484] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd" HandleID="k8s-pod-network.13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd" Workload="ip--172--31--26--167-k8s-coredns--7c65d6cfc9--rtg8v-eth0" Jul 12 00:26:23.674905 env[1733]: 2025-07-12 00:26:23.642 [INFO][5484] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 12 00:26:23.674905 env[1733]: 2025-07-12 00:26:23.642 [INFO][5484] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 12 00:26:23.674905 env[1733]: 2025-07-12 00:26:23.662 [WARNING][5484] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd" HandleID="k8s-pod-network.13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd" Workload="ip--172--31--26--167-k8s-coredns--7c65d6cfc9--rtg8v-eth0" Jul 12 00:26:23.674905 env[1733]: 2025-07-12 00:26:23.662 [INFO][5484] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd" HandleID="k8s-pod-network.13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd" Workload="ip--172--31--26--167-k8s-coredns--7c65d6cfc9--rtg8v-eth0" Jul 12 00:26:23.674905 env[1733]: 2025-07-12 00:26:23.667 [INFO][5484] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 12 00:26:23.674905 env[1733]: 2025-07-12 00:26:23.670 [INFO][5477] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd" Jul 12 00:26:23.676198 env[1733]: time="2025-07-12T00:26:23.676146885Z" level=info msg="TearDown network for sandbox \"13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd\" successfully" Jul 12 00:26:23.687216 env[1733]: time="2025-07-12T00:26:23.687154095Z" level=info msg="RemovePodSandbox \"13d5e35a14c130dd7a70843f15728a4827e7bd950dda1db7e40a78434359a6dd\" returns successfully" Jul 12 00:26:24.309640 systemd[1]: Started sshd@8-172.31.26.167:22-147.75.109.163:37476.service. Jul 12 00:26:24.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.26.167:22-147.75.109.163:37476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:26:24.312036 kernel: kauditd_printk_skb: 74 callbacks suppressed Jul 12 00:26:24.312307 kernel: audit: type=1130 audit(1752279984.309:1382): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.26.167:22-147.75.109.163:37476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:26:24.521000 audit[5499]: USER_ACCT pid=5499 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:24.522511 sshd[5499]: Accepted publickey for core from 147.75.109.163 port 37476 ssh2: RSA SHA256:hAayEOBHnTpwll2xPQSU8cSp7XCWn/pXChvPbqogNKA Jul 12 00:26:24.535772 kernel: audit: type=1101 audit(1752279984.521:1383): pid=5499 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:24.537856 sshd[5499]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 12 00:26:24.535000 audit[5499]: CRED_ACQ pid=5499 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:24.558495 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3364843766.mount: Deactivated successfully. Jul 12 00:26:24.575375 kernel: audit: type=1103 audit(1752279984.535:1384): pid=5499 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:24.575539 kernel: audit: type=1006 audit(1752279984.535:1385): pid=5499 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Jul 12 00:26:24.572793 systemd-logind[1726]: New session 9 of user core. Jul 12 00:26:24.575359 systemd[1]: Started session-9.scope. Jul 12 00:26:24.535000 audit[5499]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeaf88390 a2=3 a3=1 items=0 ppid=1 pid=5499 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:24.535000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 12 00:26:24.593837 kernel: audit: type=1300 audit(1752279984.535:1385): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeaf88390 a2=3 a3=1 items=0 ppid=1 pid=5499 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:24.594009 kernel: audit: type=1327 audit(1752279984.535:1385): proctitle=737368643A20636F7265205B707269765D Jul 12 00:26:24.601000 audit[5499]: USER_START pid=5499 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:24.605000 audit[5501]: CRED_ACQ pid=5501 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:24.628792 kernel: audit: type=1105 audit(1752279984.601:1386): pid=5499 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:24.628954 kernel: audit: type=1103 audit(1752279984.605:1387): pid=5501 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:24.643147 env[1733]: time="2025-07-12T00:26:24.643079946Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker-backend:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:26:24.648349 env[1733]: time="2025-07-12T00:26:24.648256586Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8763d908c0cd23d0e87bc61ce1ba8371b86449688baf955e5eeff7f7d7e101c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:26:24.652359 env[1733]: time="2025-07-12T00:26:24.652295028Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/whisker-backend:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:26:24.658642 env[1733]: time="2025-07-12T00:26:24.656782586Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker-backend@sha256:fbf7f21f5aba95930803ad7e7dea8b083220854eae72c2a7c51681c09c5614b5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:26:24.658642 env[1733]: time="2025-07-12T00:26:24.657542229Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.2\" returns image reference \"sha256:8763d908c0cd23d0e87bc61ce1ba8371b86449688baf955e5eeff7f7d7e101c4\"" Jul 12 00:26:24.663005 env[1733]: time="2025-07-12T00:26:24.662740133Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.2\"" Jul 12 00:26:24.668241 env[1733]: time="2025-07-12T00:26:24.668151891Z" level=info msg="CreateContainer within sandbox \"f46a5340ea79b455bd77b3faaac4890c99870f93fac42616e3714bd8d77168fb\" for container &ContainerMetadata{Name:whisker-backend,Attempt:0,}" Jul 12 00:26:24.715673 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3322675915.mount: Deactivated successfully. Jul 12 00:26:24.737438 env[1733]: time="2025-07-12T00:26:24.737345474Z" level=info msg="CreateContainer within sandbox \"f46a5340ea79b455bd77b3faaac4890c99870f93fac42616e3714bd8d77168fb\" for &ContainerMetadata{Name:whisker-backend,Attempt:0,} returns container id \"bf11e29826e3760cb51924417b06a06e03fe9783c89265967a2a51abdec2b5c3\"" Jul 12 00:26:24.739015 env[1733]: time="2025-07-12T00:26:24.738930339Z" level=info msg="StartContainer for \"bf11e29826e3760cb51924417b06a06e03fe9783c89265967a2a51abdec2b5c3\"" Jul 12 00:26:24.756400 kubelet[2742]: I0712 00:26:24.756023 2742 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 12 00:26:24.848095 systemd[1]: Started cri-containerd-bf11e29826e3760cb51924417b06a06e03fe9783c89265967a2a51abdec2b5c3.scope. Jul 12 00:26:25.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:25.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:25.026786 kernel: audit: type=1400 audit(1752279985.005:1388): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:25.026959 kernel: audit: type=1400 audit(1752279985.005:1389): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:25.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:25.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:25.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:25.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:25.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:25.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:25.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:25.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:25.014000 audit: BPF prog-id=212 op=LOAD Jul 12 00:26:25.015000 audit[5515]: AVC avc: denied { bpf } for pid=5515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:25.015000 audit[5515]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4075 pid=5515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:25.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266313165323938323665333736306362353139323434313762303661 Jul 12 00:26:25.015000 audit[5515]: AVC avc: denied { perfmon } for pid=5515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:25.015000 audit[5515]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4075 pid=5515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:25.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266313165323938323665333736306362353139323434313762303661 Jul 12 00:26:25.015000 audit[5515]: AVC avc: denied { bpf } for pid=5515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:25.015000 audit[5515]: AVC avc: denied { bpf } for pid=5515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:25.015000 audit[5515]: AVC avc: denied { bpf } for pid=5515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:25.015000 audit[5515]: AVC avc: denied { perfmon } for pid=5515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:25.015000 audit[5515]: AVC avc: denied { perfmon } for pid=5515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:25.015000 audit[5515]: AVC avc: denied { perfmon } for pid=5515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:25.015000 audit[5515]: AVC avc: denied { perfmon } for pid=5515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:25.015000 audit[5515]: AVC avc: denied { perfmon } for pid=5515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:25.015000 audit[5515]: AVC avc: denied { bpf } for pid=5515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:25.015000 audit[5515]: AVC avc: denied { bpf } for pid=5515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:25.015000 audit: BPF prog-id=213 op=LOAD Jul 12 00:26:25.015000 audit[5515]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4075 pid=5515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:25.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266313165323938323665333736306362353139323434313762303661 Jul 12 00:26:25.015000 audit[5515]: AVC avc: denied { bpf } for pid=5515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:25.015000 audit[5515]: AVC avc: denied { bpf } for pid=5515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:25.015000 audit[5515]: AVC avc: denied { perfmon } for pid=5515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:25.015000 audit[5515]: AVC avc: denied { perfmon } for pid=5515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:25.015000 audit[5515]: AVC avc: denied { perfmon } for pid=5515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:25.015000 audit[5515]: AVC avc: denied { perfmon } for pid=5515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:25.015000 audit[5515]: AVC avc: denied { perfmon } for pid=5515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:25.015000 audit[5515]: AVC avc: denied { bpf } for pid=5515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:25.015000 audit[5515]: AVC avc: denied { bpf } for pid=5515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:25.015000 audit: BPF prog-id=214 op=LOAD Jul 12 00:26:25.015000 audit[5515]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4075 pid=5515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:25.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266313165323938323665333736306362353139323434313762303661 Jul 12 00:26:25.015000 audit: BPF prog-id=214 op=UNLOAD Jul 12 00:26:25.015000 audit: BPF prog-id=213 op=UNLOAD Jul 12 00:26:25.015000 audit[5515]: AVC avc: denied { bpf } for pid=5515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:25.015000 audit[5515]: AVC avc: denied { bpf } for pid=5515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:25.015000 audit[5515]: AVC avc: denied { bpf } for pid=5515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:25.015000 audit[5515]: AVC avc: denied { perfmon } for pid=5515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:25.015000 audit[5515]: AVC avc: denied { perfmon } for pid=5515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:25.015000 audit[5515]: AVC avc: denied { perfmon } for pid=5515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:25.015000 audit[5515]: AVC avc: denied { perfmon } for pid=5515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:25.015000 audit[5515]: AVC avc: denied { perfmon } for pid=5515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:25.015000 audit[5515]: AVC avc: denied { bpf } for pid=5515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:25.015000 audit[5515]: AVC avc: denied { bpf } for pid=5515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:25.015000 audit: BPF prog-id=215 op=LOAD Jul 12 00:26:25.015000 audit[5515]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4075 pid=5515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:25.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266313165323938323665333736306362353139323434313762303661 Jul 12 00:26:25.059057 sshd[5499]: pam_unix(sshd:session): session closed for user core Jul 12 00:26:25.060000 audit[5499]: USER_END pid=5499 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:25.060000 audit[5499]: CRED_DISP pid=5499 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:25.064697 systemd-logind[1726]: Session 9 logged out. Waiting for processes to exit. Jul 12 00:26:25.067534 systemd[1]: session-9.scope: Deactivated successfully. Jul 12 00:26:25.068928 systemd[1]: sshd@8-172.31.26.167:22-147.75.109.163:37476.service: Deactivated successfully. Jul 12 00:26:25.068000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.26.167:22-147.75.109.163:37476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:26:25.074117 systemd-logind[1726]: Removed session 9. Jul 12 00:26:25.120513 env[1733]: time="2025-07-12T00:26:25.120336944Z" level=info msg="StartContainer for \"bf11e29826e3760cb51924417b06a06e03fe9783c89265967a2a51abdec2b5c3\" returns successfully" Jul 12 00:26:25.558129 systemd[1]: run-containerd-runc-k8s.io-bf11e29826e3760cb51924417b06a06e03fe9783c89265967a2a51abdec2b5c3-runc.8I8bKS.mount: Deactivated successfully. Jul 12 00:26:25.661000 audit[5309]: AVC avc: denied { watch } for pid=5309 comm="apiserver" path="/calico-apiserver-certs/..2025_07_12_00_26_00.2319783168/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c686,c788 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c686,c788 tclass=file permissive=0 Jul 12 00:26:25.661000 audit[5309]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000f13aa0 a2=fc6 a3=0 items=0 ppid=4332 pid=5309 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c686,c788 key=(null) Jul 12 00:26:25.661000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 12 00:26:25.914000 audit[5551]: NETFILTER_CFG table=filter:120 family=2 entries=13 op=nft_register_rule pid=5551 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:26:25.914000 audit[5551]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffcd682e60 a2=0 a3=1 items=0 ppid=2843 pid=5551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:25.914000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:26:25.919000 audit[5551]: NETFILTER_CFG table=nat:121 family=2 entries=27 op=nft_register_chain pid=5551 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:26:25.919000 audit[5551]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffcd682e60 a2=0 a3=1 items=0 ppid=2843 pid=5551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:25.919000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:26:25.977000 audit[5553]: NETFILTER_CFG table=filter:122 family=2 entries=11 op=nft_register_rule pid=5553 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:26:25.977000 audit[5553]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffc9ded5b0 a2=0 a3=1 items=0 ppid=2843 pid=5553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:25.977000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:26:25.984000 audit[5553]: NETFILTER_CFG table=nat:123 family=2 entries=29 op=nft_register_chain pid=5553 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:26:25.984000 audit[5553]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=10116 a0=3 a1=ffffc9ded5b0 a2=0 a3=1 items=0 ppid=2843 pid=5553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:25.984000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:26:27.251263 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2014343487.mount: Deactivated successfully. Jul 12 00:26:28.300565 env[1733]: time="2025-07-12T00:26:28.300477379Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/goldmane:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:26:28.304159 env[1733]: time="2025-07-12T00:26:28.304057340Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1389d38feb576cfff09a57a2c028a53e51a72c658f295166960f770eaf07985f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:26:28.309086 env[1733]: time="2025-07-12T00:26:28.308984726Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/goldmane:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:26:28.313012 env[1733]: time="2025-07-12T00:26:28.312930835Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/goldmane@sha256:a2b761fd93d824431ad93e59e8e670cdf00b478f4b532145297e1e67f2768305,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:26:28.314451 env[1733]: time="2025-07-12T00:26:28.314391603Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.2\" returns image reference \"sha256:1389d38feb576cfff09a57a2c028a53e51a72c658f295166960f770eaf07985f\"" Jul 12 00:26:28.318495 env[1733]: time="2025-07-12T00:26:28.318340820Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.2\"" Jul 12 00:26:28.321468 env[1733]: time="2025-07-12T00:26:28.321370717Z" level=info msg="CreateContainer within sandbox \"51262c9ac632bb37d5bb70bebe6ec597ad86ed7fa070d532cfa587c8f7cf7b13\" for container &ContainerMetadata{Name:goldmane,Attempt:0,}" Jul 12 00:26:28.346867 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3480504734.mount: Deactivated successfully. Jul 12 00:26:28.355826 env[1733]: time="2025-07-12T00:26:28.355747928Z" level=info msg="CreateContainer within sandbox \"51262c9ac632bb37d5bb70bebe6ec597ad86ed7fa070d532cfa587c8f7cf7b13\" for &ContainerMetadata{Name:goldmane,Attempt:0,} returns container id \"e28616d2390513d570ba65d4da702155d95a0dc52be5ad6ec6fa44fbd75de710\"" Jul 12 00:26:28.358970 env[1733]: time="2025-07-12T00:26:28.358844522Z" level=info msg="StartContainer for \"e28616d2390513d570ba65d4da702155d95a0dc52be5ad6ec6fa44fbd75de710\"" Jul 12 00:26:28.416052 systemd[1]: Started cri-containerd-e28616d2390513d570ba65d4da702155d95a0dc52be5ad6ec6fa44fbd75de710.scope. Jul 12 00:26:28.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:28.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:28.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:28.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:28.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:28.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:28.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:28.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:28.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:28.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:28.468000 audit: BPF prog-id=216 op=LOAD Jul 12 00:26:28.471000 audit[5564]: AVC avc: denied { bpf } for pid=5564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:28.471000 audit[5564]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4704 pid=5564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:28.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532383631366432333930353133643537306261363564346461373032 Jul 12 00:26:28.472000 audit[5564]: AVC avc: denied { perfmon } for pid=5564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:28.472000 audit[5564]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4704 pid=5564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:28.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532383631366432333930353133643537306261363564346461373032 Jul 12 00:26:28.473000 audit[5564]: AVC avc: denied { bpf } for pid=5564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:28.473000 audit[5564]: AVC avc: denied { bpf } for pid=5564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:28.473000 audit[5564]: AVC avc: denied { bpf } for pid=5564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:28.473000 audit[5564]: AVC avc: denied { perfmon } for pid=5564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:28.473000 audit[5564]: AVC avc: denied { perfmon } for pid=5564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:28.473000 audit[5564]: AVC avc: denied { perfmon } for pid=5564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:28.473000 audit[5564]: AVC avc: denied { perfmon } for pid=5564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:28.473000 audit[5564]: AVC avc: denied { perfmon } for pid=5564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:28.473000 audit[5564]: AVC avc: denied { bpf } for pid=5564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:28.473000 audit[5564]: AVC avc: denied { bpf } for pid=5564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:28.473000 audit: BPF prog-id=217 op=LOAD Jul 12 00:26:28.473000 audit[5564]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4704 pid=5564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:28.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532383631366432333930353133643537306261363564346461373032 Jul 12 00:26:28.474000 audit[5564]: AVC avc: denied { bpf } for pid=5564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:28.474000 audit[5564]: AVC avc: denied { bpf } for pid=5564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:28.474000 audit[5564]: AVC avc: denied { perfmon } for pid=5564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:28.474000 audit[5564]: AVC avc: denied { perfmon } for pid=5564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:28.474000 audit[5564]: AVC avc: denied { perfmon } for pid=5564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:28.474000 audit[5564]: AVC avc: denied { perfmon } for pid=5564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:28.474000 audit[5564]: AVC avc: denied { perfmon } for pid=5564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:28.474000 audit[5564]: AVC avc: denied { bpf } for pid=5564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:28.474000 audit[5564]: AVC avc: denied { bpf } for pid=5564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:28.474000 audit: BPF prog-id=218 op=LOAD Jul 12 00:26:28.474000 audit[5564]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4704 pid=5564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:28.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532383631366432333930353133643537306261363564346461373032 Jul 12 00:26:28.474000 audit: BPF prog-id=218 op=UNLOAD Jul 12 00:26:28.474000 audit: BPF prog-id=217 op=UNLOAD Jul 12 00:26:28.474000 audit[5564]: AVC avc: denied { bpf } for pid=5564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:28.474000 audit[5564]: AVC avc: denied { bpf } for pid=5564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:28.474000 audit[5564]: AVC avc: denied { bpf } for pid=5564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:28.474000 audit[5564]: AVC avc: denied { perfmon } for pid=5564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:28.474000 audit[5564]: AVC avc: denied { perfmon } for pid=5564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:28.474000 audit[5564]: AVC avc: denied { perfmon } for pid=5564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:28.474000 audit[5564]: AVC avc: denied { perfmon } for pid=5564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:28.474000 audit[5564]: AVC avc: denied { perfmon } for pid=5564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:28.474000 audit[5564]: AVC avc: denied { bpf } for pid=5564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:28.474000 audit[5564]: AVC avc: denied { bpf } for pid=5564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:28.474000 audit: BPF prog-id=219 op=LOAD Jul 12 00:26:28.474000 audit[5564]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4704 pid=5564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:28.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532383631366432333930353133643537306261363564346461373032 Jul 12 00:26:28.563379 env[1733]: time="2025-07-12T00:26:28.563218737Z" level=info msg="StartContainer for \"e28616d2390513d570ba65d4da702155d95a0dc52be5ad6ec6fa44fbd75de710\" returns successfully" Jul 12 00:26:28.826893 kubelet[2742]: I0712 00:26:28.825777 2742 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/goldmane-58fd7646b9-rmlz5" podStartSLOduration=29.729857443 podStartE2EDuration="40.825750355s" podCreationTimestamp="2025-07-12 00:25:48 +0000 UTC" firstStartedPulling="2025-07-12 00:26:17.220913411 +0000 UTC m=+58.364892641" lastFinishedPulling="2025-07-12 00:26:28.316806299 +0000 UTC m=+69.460785553" observedRunningTime="2025-07-12 00:26:28.819900264 +0000 UTC m=+69.963879542" watchObservedRunningTime="2025-07-12 00:26:28.825750355 +0000 UTC m=+69.969729609" Jul 12 00:26:28.826893 kubelet[2742]: I0712 00:26:28.826471 2742 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/whisker-7bfc744f4d-xbqj5" podStartSLOduration=6.052620733 podStartE2EDuration="18.826457909s" podCreationTimestamp="2025-07-12 00:26:10 +0000 UTC" firstStartedPulling="2025-07-12 00:26:11.887739103 +0000 UTC m=+53.031718345" lastFinishedPulling="2025-07-12 00:26:24.661576267 +0000 UTC m=+65.805555521" observedRunningTime="2025-07-12 00:26:25.84762725 +0000 UTC m=+66.991606528" watchObservedRunningTime="2025-07-12 00:26:28.826457909 +0000 UTC m=+69.970437151" Jul 12 00:26:28.879000 audit[5608]: NETFILTER_CFG table=filter:124 family=2 entries=10 op=nft_register_rule pid=5608 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:26:28.879000 audit[5608]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffe4543fd0 a2=0 a3=1 items=0 ppid=2843 pid=5608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:28.879000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:26:28.885000 audit[5608]: NETFILTER_CFG table=nat:125 family=2 entries=24 op=nft_register_rule pid=5608 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:26:28.885000 audit[5608]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=7308 a0=3 a1=ffffe4543fd0 a2=0 a3=1 items=0 ppid=2843 pid=5608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:28.885000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:26:29.868577 systemd[1]: run-containerd-runc-k8s.io-e28616d2390513d570ba65d4da702155d95a0dc52be5ad6ec6fa44fbd75de710-runc.z06nzd.mount: Deactivated successfully. Jul 12 00:26:30.088749 systemd[1]: Started sshd@9-172.31.26.167:22-147.75.109.163:48626.service. Jul 12 00:26:30.095254 kernel: kauditd_printk_skb: 136 callbacks suppressed Jul 12 00:26:30.095395 kernel: audit: type=1130 audit(1752279990.088:1434): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.26.167:22-147.75.109.163:48626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:26:30.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.26.167:22-147.75.109.163:48626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:26:30.313000 audit[5634]: USER_ACCT pid=5634 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:30.321818 systemd[1]: run-containerd-runc-k8s.io-e28616d2390513d570ba65d4da702155d95a0dc52be5ad6ec6fa44fbd75de710-runc.9aDZaH.mount: Deactivated successfully. Jul 12 00:26:30.330334 sshd[5634]: Accepted publickey for core from 147.75.109.163 port 48626 ssh2: RSA SHA256:hAayEOBHnTpwll2xPQSU8cSp7XCWn/pXChvPbqogNKA Jul 12 00:26:30.338181 sshd[5634]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 12 00:26:30.335000 audit[5634]: CRED_ACQ pid=5634 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:30.350521 kernel: audit: type=1101 audit(1752279990.313:1435): pid=5634 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:30.351098 kernel: audit: type=1103 audit(1752279990.335:1436): pid=5634 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:30.366454 kernel: audit: type=1006 audit(1752279990.336:1437): pid=5634 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Jul 12 00:26:30.336000 audit[5634]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff7387520 a2=3 a3=1 items=0 ppid=1 pid=5634 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:30.368349 systemd[1]: Started session-10.scope. Jul 12 00:26:30.370291 systemd-logind[1726]: New session 10 of user core. Jul 12 00:26:30.379491 kernel: audit: type=1300 audit(1752279990.336:1437): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff7387520 a2=3 a3=1 items=0 ppid=1 pid=5634 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:30.336000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 12 00:26:30.386882 kernel: audit: type=1327 audit(1752279990.336:1437): proctitle=737368643A20636F7265205B707269765D Jul 12 00:26:30.389000 audit[5634]: USER_START pid=5634 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:30.403347 kernel: audit: type=1105 audit(1752279990.389:1438): pid=5634 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:30.390000 audit[5644]: CRED_ACQ pid=5644 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:30.421225 kernel: audit: type=1103 audit(1752279990.390:1439): pid=5644 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:30.885445 sshd[5634]: pam_unix(sshd:session): session closed for user core Jul 12 00:26:30.887000 audit[5634]: USER_END pid=5634 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:30.891365 systemd-logind[1726]: Session 10 logged out. Waiting for processes to exit. Jul 12 00:26:30.902493 systemd[1]: sshd@9-172.31.26.167:22-147.75.109.163:48626.service: Deactivated successfully. Jul 12 00:26:30.905022 systemd[1]: session-10.scope: Deactivated successfully. Jul 12 00:26:30.887000 audit[5634]: CRED_DISP pid=5634 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:30.915971 kernel: audit: type=1106 audit(1752279990.887:1440): pid=5634 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:30.916169 kernel: audit: type=1104 audit(1752279990.887:1441): pid=5634 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:30.902000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.26.167:22-147.75.109.163:48626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:26:30.925454 systemd-logind[1726]: Removed session 10. Jul 12 00:26:30.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.26.167:22-147.75.109.163:48640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:26:30.935038 systemd[1]: Started sshd@10-172.31.26.167:22-147.75.109.163:48640.service. Jul 12 00:26:31.162000 audit[5665]: USER_ACCT pid=5665 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:31.163240 sshd[5665]: Accepted publickey for core from 147.75.109.163 port 48640 ssh2: RSA SHA256:hAayEOBHnTpwll2xPQSU8cSp7XCWn/pXChvPbqogNKA Jul 12 00:26:31.169000 audit[5665]: CRED_ACQ pid=5665 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:31.169000 audit[5665]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd0751220 a2=3 a3=1 items=0 ppid=1 pid=5665 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:31.169000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 12 00:26:31.171511 sshd[5665]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 12 00:26:31.186920 systemd[1]: Started session-11.scope. Jul 12 00:26:31.188830 systemd-logind[1726]: New session 11 of user core. Jul 12 00:26:31.206000 audit[5665]: USER_START pid=5665 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:31.210000 audit[5668]: CRED_ACQ pid=5668 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:31.336000 audit[5674]: NETFILTER_CFG table=filter:126 family=2 entries=9 op=nft_register_rule pid=5674 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:26:31.336000 audit[5674]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffcdc26400 a2=0 a3=1 items=0 ppid=2843 pid=5674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:31.336000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:26:31.355000 audit[5674]: NETFILTER_CFG table=nat:127 family=2 entries=31 op=nft_register_chain pid=5674 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:26:31.355000 audit[5674]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=10884 a0=3 a1=ffffcdc26400 a2=0 a3=1 items=0 ppid=2843 pid=5674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:31.355000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:26:31.738482 sshd[5665]: pam_unix(sshd:session): session closed for user core Jul 12 00:26:31.741000 audit[5665]: USER_END pid=5665 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:31.741000 audit[5665]: CRED_DISP pid=5665 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:31.744000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.26.167:22-147.75.109.163:48640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:26:31.744670 systemd[1]: sshd@10-172.31.26.167:22-147.75.109.163:48640.service: Deactivated successfully. Jul 12 00:26:31.746044 systemd[1]: session-11.scope: Deactivated successfully. Jul 12 00:26:31.748870 systemd-logind[1726]: Session 11 logged out. Waiting for processes to exit. Jul 12 00:26:31.751180 systemd-logind[1726]: Removed session 11. Jul 12 00:26:31.770815 systemd[1]: Started sshd@11-172.31.26.167:22-147.75.109.163:48656.service. Jul 12 00:26:31.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.26.167:22-147.75.109.163:48656 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:26:31.967000 audit[5678]: USER_ACCT pid=5678 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:31.968725 sshd[5678]: Accepted publickey for core from 147.75.109.163 port 48656 ssh2: RSA SHA256:hAayEOBHnTpwll2xPQSU8cSp7XCWn/pXChvPbqogNKA Jul 12 00:26:31.969000 audit[5678]: CRED_ACQ pid=5678 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:31.969000 audit[5678]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc0b78880 a2=3 a3=1 items=0 ppid=1 pid=5678 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:31.969000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 12 00:26:31.972414 sshd[5678]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 12 00:26:31.992754 systemd[1]: Started session-12.scope. Jul 12 00:26:31.995951 systemd-logind[1726]: New session 12 of user core. Jul 12 00:26:32.022000 audit[5678]: USER_START pid=5678 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:32.025000 audit[5680]: CRED_ACQ pid=5680 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:32.327974 sshd[5678]: pam_unix(sshd:session): session closed for user core Jul 12 00:26:32.329000 audit[5678]: USER_END pid=5678 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:32.329000 audit[5678]: CRED_DISP pid=5678 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:32.334000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.26.167:22-147.75.109.163:48656 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:26:32.334357 systemd[1]: sshd@11-172.31.26.167:22-147.75.109.163:48656.service: Deactivated successfully. Jul 12 00:26:32.336384 systemd[1]: session-12.scope: Deactivated successfully. Jul 12 00:26:32.338031 systemd-logind[1726]: Session 12 logged out. Waiting for processes to exit. Jul 12 00:26:32.340349 systemd-logind[1726]: Removed session 12. Jul 12 00:26:32.444186 env[1733]: time="2025-07-12T00:26:32.444128682Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:26:32.448801 env[1733]: time="2025-07-12T00:26:32.448718212Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ba9e7793995ca67a9b78aa06adda4e89cbd435b1e88ab1032ca665140517fa7a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:26:32.453813 env[1733]: time="2025-07-12T00:26:32.453755134Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:26:32.456735 env[1733]: time="2025-07-12T00:26:32.456646753Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:5d3ecdec3cbbe8f7009077102e35e8a2141161b59c548cf3f97829177677cbce,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:26:32.457817 env[1733]: time="2025-07-12T00:26:32.457758273Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.2\" returns image reference \"sha256:ba9e7793995ca67a9b78aa06adda4e89cbd435b1e88ab1032ca665140517fa7a\"" Jul 12 00:26:32.462768 env[1733]: time="2025-07-12T00:26:32.461929368Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.2\"" Jul 12 00:26:32.496825 env[1733]: time="2025-07-12T00:26:32.496604504Z" level=info msg="CreateContainer within sandbox \"bf666321dcec7f436fe286592b857e4d01fb78b02262c76d77d8e7787d7a322d\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Jul 12 00:26:32.540466 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4147863893.mount: Deactivated successfully. Jul 12 00:26:32.554533 env[1733]: time="2025-07-12T00:26:32.554388141Z" level=info msg="CreateContainer within sandbox \"bf666321dcec7f436fe286592b857e4d01fb78b02262c76d77d8e7787d7a322d\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"daae4e7880241fbbba6154d4da6b9ef3ae40235ca1ab0051ec06c9b6d4a26e85\"" Jul 12 00:26:32.558863 env[1733]: time="2025-07-12T00:26:32.556086147Z" level=info msg="StartContainer for \"daae4e7880241fbbba6154d4da6b9ef3ae40235ca1ab0051ec06c9b6d4a26e85\"" Jul 12 00:26:32.600312 systemd[1]: Started cri-containerd-daae4e7880241fbbba6154d4da6b9ef3ae40235ca1ab0051ec06c9b6d4a26e85.scope. Jul 12 00:26:32.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:32.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:32.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:32.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:32.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:32.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:32.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:32.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:32.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:32.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:32.651000 audit: BPF prog-id=220 op=LOAD Jul 12 00:26:32.652000 audit[5701]: AVC avc: denied { bpf } for pid=5701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:32.652000 audit[5701]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4924 pid=5701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:32.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461616534653738383032343166626262613631353464346461366239 Jul 12 00:26:32.652000 audit[5701]: AVC avc: denied { perfmon } for pid=5701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:32.652000 audit[5701]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4924 pid=5701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:32.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461616534653738383032343166626262613631353464346461366239 Jul 12 00:26:32.652000 audit[5701]: AVC avc: denied { bpf } for pid=5701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:32.652000 audit[5701]: AVC avc: denied { bpf } for pid=5701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:32.652000 audit[5701]: AVC avc: denied { bpf } for pid=5701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:32.652000 audit[5701]: AVC avc: denied { perfmon } for pid=5701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:32.652000 audit[5701]: AVC avc: denied { perfmon } for pid=5701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:32.652000 audit[5701]: AVC avc: denied { perfmon } for pid=5701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:32.652000 audit[5701]: AVC avc: denied { perfmon } for pid=5701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:32.652000 audit[5701]: AVC avc: denied { perfmon } for pid=5701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:32.652000 audit[5701]: AVC avc: denied { bpf } for pid=5701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:32.652000 audit[5701]: AVC avc: denied { bpf } for pid=5701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:32.652000 audit: BPF prog-id=221 op=LOAD Jul 12 00:26:32.652000 audit[5701]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4924 pid=5701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:32.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461616534653738383032343166626262613631353464346461366239 Jul 12 00:26:32.652000 audit[5701]: AVC avc: denied { bpf } for pid=5701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:32.652000 audit[5701]: AVC avc: denied { bpf } for pid=5701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:32.652000 audit[5701]: AVC avc: denied { perfmon } for pid=5701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:32.652000 audit[5701]: AVC avc: denied { perfmon } for pid=5701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:32.652000 audit[5701]: AVC avc: denied { perfmon } for pid=5701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:32.652000 audit[5701]: AVC avc: denied { perfmon } for pid=5701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:32.652000 audit[5701]: AVC avc: denied { perfmon } for pid=5701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:32.652000 audit[5701]: AVC avc: denied { bpf } for pid=5701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:32.652000 audit[5701]: AVC avc: denied { bpf } for pid=5701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:32.652000 audit: BPF prog-id=222 op=LOAD Jul 12 00:26:32.652000 audit[5701]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4924 pid=5701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:32.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461616534653738383032343166626262613631353464346461366239 Jul 12 00:26:32.652000 audit: BPF prog-id=222 op=UNLOAD Jul 12 00:26:32.652000 audit: BPF prog-id=221 op=UNLOAD Jul 12 00:26:32.652000 audit[5701]: AVC avc: denied { bpf } for pid=5701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:32.652000 audit[5701]: AVC avc: denied { bpf } for pid=5701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:32.652000 audit[5701]: AVC avc: denied { bpf } for pid=5701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:32.652000 audit[5701]: AVC avc: denied { perfmon } for pid=5701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:32.652000 audit[5701]: AVC avc: denied { perfmon } for pid=5701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:32.652000 audit[5701]: AVC avc: denied { perfmon } for pid=5701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:32.652000 audit[5701]: AVC avc: denied { perfmon } for pid=5701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:32.652000 audit[5701]: AVC avc: denied { perfmon } for pid=5701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:32.652000 audit[5701]: AVC avc: denied { bpf } for pid=5701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:32.652000 audit[5701]: AVC avc: denied { bpf } for pid=5701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:32.652000 audit: BPF prog-id=223 op=LOAD Jul 12 00:26:32.652000 audit[5701]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4924 pid=5701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:32.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461616534653738383032343166626262613631353464346461366239 Jul 12 00:26:32.705918 env[1733]: time="2025-07-12T00:26:32.705855521Z" level=info msg="StartContainer for \"daae4e7880241fbbba6154d4da6b9ef3ae40235ca1ab0051ec06c9b6d4a26e85\" returns successfully" Jul 12 00:26:32.791132 env[1733]: time="2025-07-12T00:26:32.791044720Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:26:32.797025 env[1733]: time="2025-07-12T00:26:32.796941493Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:3371ea1b18040228ef58c964e49b96f4291def748753dfbc0aef87a55f906b8f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:26:32.802338 env[1733]: time="2025-07-12T00:26:32.802281396Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:26:32.805526 env[1733]: time="2025-07-12T00:26:32.805471053Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ec6b10660962e7caad70c47755049fad68f9fc2f7064e8bc7cb862583e02cc2b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:26:32.806826 env[1733]: time="2025-07-12T00:26:32.806721392Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.2\" returns image reference \"sha256:3371ea1b18040228ef58c964e49b96f4291def748753dfbc0aef87a55f906b8f\"" Jul 12 00:26:32.814309 env[1733]: time="2025-07-12T00:26:32.814213750Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.2\"" Jul 12 00:26:32.819786 env[1733]: time="2025-07-12T00:26:32.819719508Z" level=info msg="CreateContainer within sandbox \"bc2545c9dcd60547a2ee8cc577172be3bee080d7a2f340c748a8ca6028d558a9\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Jul 12 00:26:32.869922 kubelet[2742]: I0712 00:26:32.869710 2742 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-5c48f86fdd-72x89" podStartSLOduration=28.977891821 podStartE2EDuration="43.869638265s" podCreationTimestamp="2025-07-12 00:25:49 +0000 UTC" firstStartedPulling="2025-07-12 00:26:17.56829361 +0000 UTC m=+58.712272852" lastFinishedPulling="2025-07-12 00:26:32.460040066 +0000 UTC m=+73.604019296" observedRunningTime="2025-07-12 00:26:32.869483546 +0000 UTC m=+74.013462788" watchObservedRunningTime="2025-07-12 00:26:32.869638265 +0000 UTC m=+74.013617519" Jul 12 00:26:32.885784 env[1733]: time="2025-07-12T00:26:32.885648807Z" level=info msg="CreateContainer within sandbox \"bc2545c9dcd60547a2ee8cc577172be3bee080d7a2f340c748a8ca6028d558a9\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"efd7cfa5e078e9e71d7e3da28cf355b9aa2c25e362140d258243ab469771fa2f\"" Jul 12 00:26:32.886939 env[1733]: time="2025-07-12T00:26:32.886882861Z" level=info msg="StartContainer for \"efd7cfa5e078e9e71d7e3da28cf355b9aa2c25e362140d258243ab469771fa2f\"" Jul 12 00:26:32.961643 systemd[1]: Started cri-containerd-efd7cfa5e078e9e71d7e3da28cf355b9aa2c25e362140d258243ab469771fa2f.scope. Jul 12 00:26:33.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:33.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:33.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:33.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:33.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:33.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:33.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:33.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:33.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:33.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:33.050000 audit: BPF prog-id=224 op=LOAD Jul 12 00:26:33.051000 audit[5753]: AVC avc: denied { bpf } for pid=5753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:33.051000 audit[5753]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=4796 pid=5753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:33.051000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566643763666135653037386539653731643765336461323863663335 Jul 12 00:26:33.051000 audit[5753]: AVC avc: denied { perfmon } for pid=5753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:33.051000 audit[5753]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=4796 pid=5753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:33.051000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566643763666135653037386539653731643765336461323863663335 Jul 12 00:26:33.051000 audit[5753]: AVC avc: denied { bpf } for pid=5753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:33.051000 audit[5753]: AVC avc: denied { bpf } for pid=5753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:33.051000 audit[5753]: AVC avc: denied { bpf } for pid=5753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:33.051000 audit[5753]: AVC avc: denied { perfmon } for pid=5753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:33.051000 audit[5753]: AVC avc: denied { perfmon } for pid=5753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:33.051000 audit[5753]: AVC avc: denied { perfmon } for pid=5753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:33.051000 audit[5753]: AVC avc: denied { perfmon } for pid=5753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:33.051000 audit[5753]: AVC avc: denied { perfmon } for pid=5753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:33.051000 audit[5753]: AVC avc: denied { bpf } for pid=5753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:33.051000 audit[5753]: AVC avc: denied { bpf } for pid=5753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:33.051000 audit: BPF prog-id=225 op=LOAD Jul 12 00:26:33.051000 audit[5753]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=4796 pid=5753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:33.051000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566643763666135653037386539653731643765336461323863663335 Jul 12 00:26:33.051000 audit[5753]: AVC avc: denied { bpf } for pid=5753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:33.051000 audit[5753]: AVC avc: denied { bpf } for pid=5753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:33.051000 audit[5753]: AVC avc: denied { perfmon } for pid=5753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:33.051000 audit[5753]: AVC avc: denied { perfmon } for pid=5753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:33.051000 audit[5753]: AVC avc: denied { perfmon } for pid=5753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:33.051000 audit[5753]: AVC avc: denied { perfmon } for pid=5753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:33.051000 audit[5753]: AVC avc: denied { perfmon } for pid=5753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:33.051000 audit[5753]: AVC avc: denied { bpf } for pid=5753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:33.051000 audit[5753]: AVC avc: denied { bpf } for pid=5753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:33.051000 audit: BPF prog-id=226 op=LOAD Jul 12 00:26:33.051000 audit[5753]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=4796 pid=5753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:33.051000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566643763666135653037386539653731643765336461323863663335 Jul 12 00:26:33.051000 audit: BPF prog-id=226 op=UNLOAD Jul 12 00:26:33.051000 audit: BPF prog-id=225 op=UNLOAD Jul 12 00:26:33.051000 audit[5753]: AVC avc: denied { bpf } for pid=5753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:33.051000 audit[5753]: AVC avc: denied { bpf } for pid=5753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:33.051000 audit[5753]: AVC avc: denied { bpf } for pid=5753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:33.051000 audit[5753]: AVC avc: denied { perfmon } for pid=5753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:33.051000 audit[5753]: AVC avc: denied { perfmon } for pid=5753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:33.051000 audit[5753]: AVC avc: denied { perfmon } for pid=5753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:33.051000 audit[5753]: AVC avc: denied { perfmon } for pid=5753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:33.051000 audit[5753]: AVC avc: denied { perfmon } for pid=5753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:33.051000 audit[5753]: AVC avc: denied { bpf } for pid=5753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:33.051000 audit[5753]: AVC avc: denied { bpf } for pid=5753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:33.051000 audit: BPF prog-id=227 op=LOAD Jul 12 00:26:33.051000 audit[5753]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=4796 pid=5753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:33.051000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566643763666135653037386539653731643765336461323863663335 Jul 12 00:26:33.137287 env[1733]: time="2025-07-12T00:26:33.137210403Z" level=info msg="StartContainer for \"efd7cfa5e078e9e71d7e3da28cf355b9aa2c25e362140d258243ab469771fa2f\" returns successfully" Jul 12 00:26:33.979000 audit[5805]: NETFILTER_CFG table=filter:128 family=2 entries=8 op=nft_register_rule pid=5805 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:26:33.979000 audit[5805]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffd3862bd0 a2=0 a3=1 items=0 ppid=2843 pid=5805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:33.979000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:26:33.989000 audit[5805]: NETFILTER_CFG table=nat:129 family=2 entries=34 op=nft_register_rule pid=5805 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:26:33.989000 audit[5805]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=10884 a0=3 a1=ffffd3862bd0 a2=0 a3=1 items=0 ppid=2843 pid=5805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:33.989000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:26:34.201710 env[1733]: time="2025-07-12T00:26:34.201625982Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:26:34.207124 env[1733]: time="2025-07-12T00:26:34.207067706Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:14ecfabbdbebd1f5a36708f8b11a95a43baddd6a935d7d78c89a9c333849fcd2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:26:34.210814 env[1733]: time="2025-07-12T00:26:34.210738939Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:26:34.217962 env[1733]: time="2025-07-12T00:26:34.217890553Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.2\" returns image reference \"sha256:14ecfabbdbebd1f5a36708f8b11a95a43baddd6a935d7d78c89a9c333849fcd2\"" Jul 12 00:26:34.218191 env[1733]: time="2025-07-12T00:26:34.218117994Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e570128aa8067a2f06b96d3cc98afa2e0a4b9790b435ee36ca051c8e72aeb8d0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:26:34.223866 env[1733]: time="2025-07-12T00:26:34.223766134Z" level=info msg="CreateContainer within sandbox \"704bdc0ab1f385b6a10a8cb91563ebe794cd367e6f6f40c6830d6bf532f3ed91\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Jul 12 00:26:34.262002 env[1733]: time="2025-07-12T00:26:34.261786562Z" level=info msg="CreateContainer within sandbox \"704bdc0ab1f385b6a10a8cb91563ebe794cd367e6f6f40c6830d6bf532f3ed91\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"b1f13179bbd2f42a8ebfaa12d3e28ec140d945346c8603b8884d6181d114c4d0\"" Jul 12 00:26:34.263309 env[1733]: time="2025-07-12T00:26:34.263239503Z" level=info msg="StartContainer for \"b1f13179bbd2f42a8ebfaa12d3e28ec140d945346c8603b8884d6181d114c4d0\"" Jul 12 00:26:34.274634 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3424049194.mount: Deactivated successfully. Jul 12 00:26:34.319587 systemd[1]: Started cri-containerd-b1f13179bbd2f42a8ebfaa12d3e28ec140d945346c8603b8884d6181d114c4d0.scope. Jul 12 00:26:34.400000 audit[5813]: AVC avc: denied { perfmon } for pid=5813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:34.400000 audit[5813]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=5013 pid=5813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:34.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231663133313739626264326634326138656266616131326433653238 Jul 12 00:26:34.400000 audit[5813]: AVC avc: denied { bpf } for pid=5813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:34.400000 audit[5813]: AVC avc: denied { bpf } for pid=5813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:34.400000 audit[5813]: AVC avc: denied { bpf } for pid=5813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:34.400000 audit[5813]: AVC avc: denied { perfmon } for pid=5813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:34.400000 audit[5813]: AVC avc: denied { perfmon } for pid=5813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:34.400000 audit[5813]: AVC avc: denied { perfmon } for pid=5813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:34.400000 audit[5813]: AVC avc: denied { perfmon } for pid=5813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:34.400000 audit[5813]: AVC avc: denied { perfmon } for pid=5813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:34.400000 audit[5813]: AVC avc: denied { bpf } for pid=5813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:34.400000 audit[5813]: AVC avc: denied { bpf } for pid=5813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:34.400000 audit: BPF prog-id=228 op=LOAD Jul 12 00:26:34.400000 audit[5813]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=5013 pid=5813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:34.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231663133313739626264326634326138656266616131326433653238 Jul 12 00:26:34.401000 audit[5813]: AVC avc: denied { bpf } for pid=5813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:34.401000 audit[5813]: AVC avc: denied { bpf } for pid=5813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:34.401000 audit[5813]: AVC avc: denied { perfmon } for pid=5813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:34.401000 audit[5813]: AVC avc: denied { perfmon } for pid=5813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:34.401000 audit[5813]: AVC avc: denied { perfmon } for pid=5813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:34.401000 audit[5813]: AVC avc: denied { perfmon } for pid=5813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:34.401000 audit[5813]: AVC avc: denied { perfmon } for pid=5813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:34.401000 audit[5813]: AVC avc: denied { bpf } for pid=5813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:34.401000 audit[5813]: AVC avc: denied { bpf } for pid=5813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:34.401000 audit: BPF prog-id=229 op=LOAD Jul 12 00:26:34.401000 audit[5813]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=5013 pid=5813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:34.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231663133313739626264326634326138656266616131326433653238 Jul 12 00:26:34.401000 audit: BPF prog-id=229 op=UNLOAD Jul 12 00:26:34.401000 audit: BPF prog-id=228 op=UNLOAD Jul 12 00:26:34.401000 audit[5813]: AVC avc: denied { bpf } for pid=5813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:34.401000 audit[5813]: AVC avc: denied { bpf } for pid=5813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:34.401000 audit[5813]: AVC avc: denied { bpf } for pid=5813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:34.401000 audit[5813]: AVC avc: denied { perfmon } for pid=5813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:34.401000 audit[5813]: AVC avc: denied { perfmon } for pid=5813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:34.401000 audit[5813]: AVC avc: denied { perfmon } for pid=5813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:34.401000 audit[5813]: AVC avc: denied { perfmon } for pid=5813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:34.401000 audit[5813]: AVC avc: denied { perfmon } for pid=5813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:34.401000 audit[5813]: AVC avc: denied { bpf } for pid=5813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:34.401000 audit[5813]: AVC avc: denied { bpf } for pid=5813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:34.401000 audit: BPF prog-id=230 op=LOAD Jul 12 00:26:34.401000 audit[5813]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=5013 pid=5813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:34.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231663133313739626264326634326138656266616131326433653238 Jul 12 00:26:34.438713 env[1733]: time="2025-07-12T00:26:34.436211313Z" level=info msg="StartContainer for \"b1f13179bbd2f42a8ebfaa12d3e28ec140d945346c8603b8884d6181d114c4d0\" returns successfully" Jul 12 00:26:34.441163 env[1733]: time="2025-07-12T00:26:34.441086085Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2\"" Jul 12 00:26:34.473578 systemd[1]: run-containerd-runc-k8s.io-b1f13179bbd2f42a8ebfaa12d3e28ec140d945346c8603b8884d6181d114c4d0-runc.IDpnqm.mount: Deactivated successfully. Jul 12 00:26:34.852752 kubelet[2742]: I0712 00:26:34.852713 2742 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 12 00:26:36.059962 env[1733]: time="2025-07-12T00:26:36.059889841Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:26:36.064404 env[1733]: time="2025-07-12T00:26:36.064329061Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:664ed31fb4687b0de23d6e6e116bc87b236790d7355871d3237c54452e02e27c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:26:36.068659 env[1733]: time="2025-07-12T00:26:36.068586442Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:26:36.071849 env[1733]: time="2025-07-12T00:26:36.071782771Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:8fec2de12dfa51bae89d941938a07af2598eb8bfcab55d0dded1d9c193d7b99f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 12 00:26:36.072427 env[1733]: time="2025-07-12T00:26:36.072371360Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2\" returns image reference \"sha256:664ed31fb4687b0de23d6e6e116bc87b236790d7355871d3237c54452e02e27c\"" Jul 12 00:26:36.079542 env[1733]: time="2025-07-12T00:26:36.079465254Z" level=info msg="CreateContainer within sandbox \"704bdc0ab1f385b6a10a8cb91563ebe794cd367e6f6f40c6830d6bf532f3ed91\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Jul 12 00:26:36.121709 env[1733]: time="2025-07-12T00:26:36.121609511Z" level=info msg="CreateContainer within sandbox \"704bdc0ab1f385b6a10a8cb91563ebe794cd367e6f6f40c6830d6bf532f3ed91\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"2b103acbf13139a1a7a30ab0b2a83f88458d8db0049b2f825d0ccb3300ad3d94\"" Jul 12 00:26:36.124710 env[1733]: time="2025-07-12T00:26:36.122800429Z" level=info msg="StartContainer for \"2b103acbf13139a1a7a30ab0b2a83f88458d8db0049b2f825d0ccb3300ad3d94\"" Jul 12 00:26:36.197667 systemd[1]: run-containerd-runc-k8s.io-2b103acbf13139a1a7a30ab0b2a83f88458d8db0049b2f825d0ccb3300ad3d94-runc.frWQjC.mount: Deactivated successfully. Jul 12 00:26:36.216262 systemd[1]: Started cri-containerd-2b103acbf13139a1a7a30ab0b2a83f88458d8db0049b2f825d0ccb3300ad3d94.scope. Jul 12 00:26:36.286895 kernel: kauditd_printk_skb: 192 callbacks suppressed Jul 12 00:26:36.287057 kernel: audit: type=1400 audit(1752279996.283:1507): avc: denied { perfmon } for pid=5843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:36.283000 audit[5843]: AVC avc: denied { perfmon } for pid=5843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:36.283000 audit[5843]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=5013 pid=5843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:36.311386 kernel: audit: type=1300 audit(1752279996.283:1507): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=5013 pid=5843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:36.311544 kernel: audit: type=1327 audit(1752279996.283:1507): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262313033616362663133313339613161376133306162306232613833 Jul 12 00:26:36.283000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262313033616362663133313339613161376133306162306232613833 Jul 12 00:26:36.283000 audit[5843]: AVC avc: denied { bpf } for pid=5843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:36.325764 kernel: audit: type=1400 audit(1752279996.283:1508): avc: denied { bpf } for pid=5843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:36.283000 audit[5843]: AVC avc: denied { bpf } for pid=5843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:36.336772 kernel: audit: type=1400 audit(1752279996.283:1508): avc: denied { bpf } for pid=5843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:36.336926 kernel: audit: type=1400 audit(1752279996.283:1508): avc: denied { bpf } for pid=5843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:36.283000 audit[5843]: AVC avc: denied { bpf } for pid=5843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:36.283000 audit[5843]: AVC avc: denied { perfmon } for pid=5843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:36.357789 kernel: audit: type=1400 audit(1752279996.283:1508): avc: denied { perfmon } for pid=5843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:36.283000 audit[5843]: AVC avc: denied { perfmon } for pid=5843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:36.376483 kernel: audit: type=1400 audit(1752279996.283:1508): avc: denied { perfmon } for pid=5843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:36.283000 audit[5843]: AVC avc: denied { perfmon } for pid=5843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:36.389375 kernel: audit: type=1400 audit(1752279996.283:1508): avc: denied { perfmon } for pid=5843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:36.283000 audit[5843]: AVC avc: denied { perfmon } for pid=5843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:36.399627 kernel: audit: type=1400 audit(1752279996.283:1508): avc: denied { perfmon } for pid=5843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:36.283000 audit[5843]: AVC avc: denied { perfmon } for pid=5843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:36.283000 audit[5843]: AVC avc: denied { bpf } for pid=5843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:36.283000 audit[5843]: AVC avc: denied { bpf } for pid=5843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:36.283000 audit: BPF prog-id=231 op=LOAD Jul 12 00:26:36.283000 audit[5843]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=5013 pid=5843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:36.283000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262313033616362663133313339613161376133306162306232613833 Jul 12 00:26:36.285000 audit[5843]: AVC avc: denied { bpf } for pid=5843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:36.285000 audit[5843]: AVC avc: denied { bpf } for pid=5843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:36.285000 audit[5843]: AVC avc: denied { perfmon } for pid=5843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:36.285000 audit[5843]: AVC avc: denied { perfmon } for pid=5843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:36.285000 audit[5843]: AVC avc: denied { perfmon } for pid=5843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:36.285000 audit[5843]: AVC avc: denied { perfmon } for pid=5843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:36.285000 audit[5843]: AVC avc: denied { perfmon } for pid=5843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:36.285000 audit[5843]: AVC avc: denied { bpf } for pid=5843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:36.285000 audit[5843]: AVC avc: denied { bpf } for pid=5843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:36.285000 audit: BPF prog-id=232 op=LOAD Jul 12 00:26:36.285000 audit[5843]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=5013 pid=5843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:36.285000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262313033616362663133313339613161376133306162306232613833 Jul 12 00:26:36.299000 audit: BPF prog-id=232 op=UNLOAD Jul 12 00:26:36.299000 audit: BPF prog-id=231 op=UNLOAD Jul 12 00:26:36.299000 audit[5843]: AVC avc: denied { bpf } for pid=5843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:36.299000 audit[5843]: AVC avc: denied { bpf } for pid=5843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:36.299000 audit[5843]: AVC avc: denied { bpf } for pid=5843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:36.299000 audit[5843]: AVC avc: denied { perfmon } for pid=5843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:36.299000 audit[5843]: AVC avc: denied { perfmon } for pid=5843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:36.299000 audit[5843]: AVC avc: denied { perfmon } for pid=5843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:36.299000 audit[5843]: AVC avc: denied { perfmon } for pid=5843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:36.299000 audit[5843]: AVC avc: denied { perfmon } for pid=5843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:36.299000 audit[5843]: AVC avc: denied { bpf } for pid=5843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:36.299000 audit[5843]: AVC avc: denied { bpf } for pid=5843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:26:36.299000 audit: BPF prog-id=233 op=LOAD Jul 12 00:26:36.299000 audit[5843]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=5013 pid=5843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:36.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262313033616362663133313339613161376133306162306232613833 Jul 12 00:26:36.412827 env[1733]: time="2025-07-12T00:26:36.412757168Z" level=info msg="StartContainer for \"2b103acbf13139a1a7a30ab0b2a83f88458d8db0049b2f825d0ccb3300ad3d94\" returns successfully" Jul 12 00:26:36.880931 kubelet[2742]: I0712 00:26:36.880807 2742 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-b5644b9bf-kx5cn" podStartSLOduration=41.708949903 podStartE2EDuration="56.880761792s" podCreationTimestamp="2025-07-12 00:25:40 +0000 UTC" firstStartedPulling="2025-07-12 00:26:17.636593301 +0000 UTC m=+58.780572543" lastFinishedPulling="2025-07-12 00:26:32.808405202 +0000 UTC m=+73.952384432" observedRunningTime="2025-07-12 00:26:33.88113837 +0000 UTC m=+75.025117624" watchObservedRunningTime="2025-07-12 00:26:36.880761792 +0000 UTC m=+78.024741034" Jul 12 00:26:36.881722 kubelet[2742]: I0712 00:26:36.881583 2742 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-grn85" podStartSLOduration=30.770313215 podStartE2EDuration="47.881544977s" podCreationTimestamp="2025-07-12 00:25:49 +0000 UTC" firstStartedPulling="2025-07-12 00:26:18.963188403 +0000 UTC m=+60.107167645" lastFinishedPulling="2025-07-12 00:26:36.074420177 +0000 UTC m=+77.218399407" observedRunningTime="2025-07-12 00:26:36.879633659 +0000 UTC m=+78.023612913" watchObservedRunningTime="2025-07-12 00:26:36.881544977 +0000 UTC m=+78.025524243" Jul 12 00:26:37.364003 systemd[1]: Started sshd@12-172.31.26.167:22-147.75.109.163:44082.service. Jul 12 00:26:37.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.26.167:22-147.75.109.163:44082 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:26:37.386000 audit[5774]: AVC avc: denied { watch } for pid=5774 comm="apiserver" path="/calico-apiserver-certs/..2025_07_12_00_26_00.1994296424/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c215,c719 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c215,c719 tclass=file permissive=0 Jul 12 00:26:37.386000 audit[5774]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=400144c480 a2=fc6 a3=0 items=0 ppid=4796 pid=5774 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c215,c719 key=(null) Jul 12 00:26:37.386000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 12 00:26:37.427130 kubelet[2742]: I0712 00:26:37.426956 2742 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Jul 12 00:26:37.427130 kubelet[2742]: I0712 00:26:37.427004 2742 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Jul 12 00:26:37.565000 audit[5873]: USER_ACCT pid=5873 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:37.566269 sshd[5873]: Accepted publickey for core from 147.75.109.163 port 44082 ssh2: RSA SHA256:hAayEOBHnTpwll2xPQSU8cSp7XCWn/pXChvPbqogNKA Jul 12 00:26:37.567000 audit[5873]: CRED_ACQ pid=5873 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:37.567000 audit[5873]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffce0e25f0 a2=3 a3=1 items=0 ppid=1 pid=5873 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:37.567000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 12 00:26:37.570415 sshd[5873]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 12 00:26:37.581635 systemd[1]: Started session-13.scope. Jul 12 00:26:37.583046 systemd-logind[1726]: New session 13 of user core. Jul 12 00:26:37.597000 audit[5873]: USER_START pid=5873 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:37.601000 audit[5875]: CRED_ACQ pid=5875 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:37.868114 sshd[5873]: pam_unix(sshd:session): session closed for user core Jul 12 00:26:37.869000 audit[5873]: USER_END pid=5873 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:37.869000 audit[5873]: CRED_DISP pid=5873 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:37.872897 systemd[1]: session-13.scope: Deactivated successfully. Jul 12 00:26:37.874000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.26.167:22-147.75.109.163:44082 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:26:37.874402 systemd[1]: sshd@12-172.31.26.167:22-147.75.109.163:44082.service: Deactivated successfully. Jul 12 00:26:37.876235 systemd-logind[1726]: Session 13 logged out. Waiting for processes to exit. Jul 12 00:26:37.878463 systemd-logind[1726]: Removed session 13. Jul 12 00:26:42.897318 systemd[1]: Started sshd@13-172.31.26.167:22-147.75.109.163:44098.service. Jul 12 00:26:42.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.26.167:22-147.75.109.163:44098 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:26:42.900351 kernel: kauditd_printk_skb: 47 callbacks suppressed Jul 12 00:26:42.900496 kernel: audit: type=1130 audit(1752280002.897:1523): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.26.167:22-147.75.109.163:44098 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:26:43.075000 audit[5895]: USER_ACCT pid=5895 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:43.076171 sshd[5895]: Accepted publickey for core from 147.75.109.163 port 44098 ssh2: RSA SHA256:hAayEOBHnTpwll2xPQSU8cSp7XCWn/pXChvPbqogNKA Jul 12 00:26:43.087747 kernel: audit: type=1101 audit(1752280003.075:1524): pid=5895 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:43.089039 sshd[5895]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 12 00:26:43.087000 audit[5895]: CRED_ACQ pid=5895 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:43.106119 kernel: audit: type=1103 audit(1752280003.087:1525): pid=5895 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:43.106259 kernel: audit: type=1006 audit(1752280003.087:1526): pid=5895 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Jul 12 00:26:43.087000 audit[5895]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdb9a7c60 a2=3 a3=1 items=0 ppid=1 pid=5895 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:43.087000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 12 00:26:43.121083 kernel: audit: type=1300 audit(1752280003.087:1526): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdb9a7c60 a2=3 a3=1 items=0 ppid=1 pid=5895 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:43.121238 kernel: audit: type=1327 audit(1752280003.087:1526): proctitle=737368643A20636F7265205B707269765D Jul 12 00:26:43.125467 systemd-logind[1726]: New session 14 of user core. Jul 12 00:26:43.126732 systemd[1]: Started session-14.scope. Jul 12 00:26:43.140000 audit[5895]: USER_START pid=5895 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:43.153754 kernel: audit: type=1105 audit(1752280003.140:1527): pid=5895 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:43.153000 audit[5897]: CRED_ACQ pid=5897 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:43.167997 kernel: audit: type=1103 audit(1752280003.153:1528): pid=5897 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:43.441462 sshd[5895]: pam_unix(sshd:session): session closed for user core Jul 12 00:26:43.442000 audit[5895]: USER_END pid=5895 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:43.442000 audit[5895]: CRED_DISP pid=5895 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:43.455971 systemd[1]: sshd@13-172.31.26.167:22-147.75.109.163:44098.service: Deactivated successfully. Jul 12 00:26:43.457394 systemd[1]: session-14.scope: Deactivated successfully. Jul 12 00:26:43.459715 systemd-logind[1726]: Session 14 logged out. Waiting for processes to exit. Jul 12 00:26:43.461696 systemd-logind[1726]: Removed session 14. Jul 12 00:26:43.465298 kernel: audit: type=1106 audit(1752280003.442:1529): pid=5895 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:43.465438 kernel: audit: type=1104 audit(1752280003.442:1530): pid=5895 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:43.455000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.26.167:22-147.75.109.163:44098 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:26:48.469045 systemd[1]: Started sshd@14-172.31.26.167:22-147.75.109.163:59330.service. Jul 12 00:26:48.473036 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 12 00:26:48.473272 kernel: audit: type=1130 audit(1752280008.468:1532): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.26.167:22-147.75.109.163:59330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:26:48.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.26.167:22-147.75.109.163:59330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:26:48.652000 audit[5911]: USER_ACCT pid=5911 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:48.656777 sshd[5911]: Accepted publickey for core from 147.75.109.163 port 59330 ssh2: RSA SHA256:hAayEOBHnTpwll2xPQSU8cSp7XCWn/pXChvPbqogNKA Jul 12 00:26:48.665727 kernel: audit: type=1101 audit(1752280008.652:1533): pid=5911 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:48.665000 audit[5911]: CRED_ACQ pid=5911 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:48.667891 sshd[5911]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 12 00:26:48.683296 kernel: audit: type=1103 audit(1752280008.665:1534): pid=5911 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:48.683508 kernel: audit: type=1006 audit(1752280008.665:1535): pid=5911 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Jul 12 00:26:48.665000 audit[5911]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff8b702f0 a2=3 a3=1 items=0 ppid=1 pid=5911 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:48.690288 systemd[1]: Started session-15.scope. Jul 12 00:26:48.693061 systemd-logind[1726]: New session 15 of user core. Jul 12 00:26:48.695092 kernel: audit: type=1300 audit(1752280008.665:1535): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff8b702f0 a2=3 a3=1 items=0 ppid=1 pid=5911 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:48.695905 kernel: audit: type=1327 audit(1752280008.665:1535): proctitle=737368643A20636F7265205B707269765D Jul 12 00:26:48.665000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 12 00:26:48.704000 audit[5911]: USER_START pid=5911 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:48.719945 kernel: audit: type=1105 audit(1752280008.704:1536): pid=5911 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:48.720171 kernel: audit: type=1103 audit(1752280008.717:1537): pid=5913 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:48.717000 audit[5913]: CRED_ACQ pid=5913 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:48.991049 sshd[5911]: pam_unix(sshd:session): session closed for user core Jul 12 00:26:48.991000 audit[5911]: USER_END pid=5911 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:48.997020 systemd[1]: session-15.scope: Deactivated successfully. Jul 12 00:26:48.998365 systemd[1]: sshd@14-172.31.26.167:22-147.75.109.163:59330.service: Deactivated successfully. Jul 12 00:26:49.005800 kernel: audit: type=1106 audit(1752280008.991:1538): pid=5911 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:49.005955 kernel: audit: type=1104 audit(1752280008.993:1539): pid=5911 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:48.993000 audit[5911]: CRED_DISP pid=5911 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:48.997000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.26.167:22-147.75.109.163:59330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:26:49.015571 systemd-logind[1726]: Session 15 logged out. Waiting for processes to exit. Jul 12 00:26:49.017338 systemd-logind[1726]: Removed session 15. Jul 12 00:26:49.254857 systemd[1]: run-containerd-runc-k8s.io-ce7f000cb5fd3fc6dc9878fadc29e9c96c86d05c2e400f262d530a55f62cf03b-runc.sPFywA.mount: Deactivated successfully. Jul 12 00:26:54.025268 systemd[1]: Started sshd@15-172.31.26.167:22-147.75.109.163:59344.service. Jul 12 00:26:54.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.26.167:22-147.75.109.163:59344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:26:54.029890 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 12 00:26:54.030022 kernel: audit: type=1130 audit(1752280014.025:1541): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.26.167:22-147.75.109.163:59344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:26:54.223384 sshd[5950]: Accepted publickey for core from 147.75.109.163 port 59344 ssh2: RSA SHA256:hAayEOBHnTpwll2xPQSU8cSp7XCWn/pXChvPbqogNKA Jul 12 00:26:54.221000 audit[5950]: USER_ACCT pid=5950 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:54.234930 sshd[5950]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 12 00:26:54.232000 audit[5950]: CRED_ACQ pid=5950 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:54.245281 kernel: audit: type=1101 audit(1752280014.221:1542): pid=5950 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:54.245397 kernel: audit: type=1103 audit(1752280014.232:1543): pid=5950 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:54.232000 audit[5950]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdc2214a0 a2=3 a3=1 items=0 ppid=1 pid=5950 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:54.262950 kernel: audit: type=1006 audit(1752280014.232:1544): pid=5950 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Jul 12 00:26:54.263080 kernel: audit: type=1300 audit(1752280014.232:1544): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdc2214a0 a2=3 a3=1 items=0 ppid=1 pid=5950 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:54.232000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 12 00:26:54.266836 kernel: audit: type=1327 audit(1752280014.232:1544): proctitle=737368643A20636F7265205B707269765D Jul 12 00:26:54.270273 systemd-logind[1726]: New session 16 of user core. Jul 12 00:26:54.272184 systemd[1]: Started session-16.scope. Jul 12 00:26:54.281000 audit[5950]: USER_START pid=5950 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:54.285000 audit[5952]: CRED_ACQ pid=5952 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:54.304942 kernel: audit: type=1105 audit(1752280014.281:1545): pid=5950 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:54.305079 kernel: audit: type=1103 audit(1752280014.285:1546): pid=5952 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:54.559880 sshd[5950]: pam_unix(sshd:session): session closed for user core Jul 12 00:26:54.560000 audit[5950]: USER_END pid=5950 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:54.575594 systemd[1]: sshd@15-172.31.26.167:22-147.75.109.163:59344.service: Deactivated successfully. Jul 12 00:26:54.577246 systemd[1]: session-16.scope: Deactivated successfully. Jul 12 00:26:54.561000 audit[5950]: CRED_DISP pid=5950 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:54.587598 kernel: audit: type=1106 audit(1752280014.560:1547): pid=5950 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:54.587788 kernel: audit: type=1104 audit(1752280014.561:1548): pid=5950 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:54.574000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.26.167:22-147.75.109.163:59344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:26:54.590971 systemd-logind[1726]: Session 16 logged out. Waiting for processes to exit. Jul 12 00:26:54.599916 systemd[1]: Started sshd@16-172.31.26.167:22-147.75.109.163:59346.service. Jul 12 00:26:54.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.26.167:22-147.75.109.163:59346 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:26:54.604940 systemd-logind[1726]: Removed session 16. Jul 12 00:26:54.788000 audit[5962]: USER_ACCT pid=5962 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:54.790665 sshd[5962]: Accepted publickey for core from 147.75.109.163 port 59346 ssh2: RSA SHA256:hAayEOBHnTpwll2xPQSU8cSp7XCWn/pXChvPbqogNKA Jul 12 00:26:54.790000 audit[5962]: CRED_ACQ pid=5962 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:54.790000 audit[5962]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcc9aa520 a2=3 a3=1 items=0 ppid=1 pid=5962 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:54.790000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 12 00:26:54.793331 sshd[5962]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 12 00:26:54.803188 systemd[1]: Started session-17.scope. Jul 12 00:26:54.804042 systemd-logind[1726]: New session 17 of user core. Jul 12 00:26:54.812000 audit[5962]: USER_START pid=5962 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:54.815000 audit[5965]: CRED_ACQ pid=5965 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:55.398171 sshd[5962]: pam_unix(sshd:session): session closed for user core Jul 12 00:26:55.398000 audit[5962]: USER_END pid=5962 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:55.398000 audit[5962]: CRED_DISP pid=5962 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:55.402623 systemd[1]: session-17.scope: Deactivated successfully. Jul 12 00:26:55.403902 systemd[1]: sshd@16-172.31.26.167:22-147.75.109.163:59346.service: Deactivated successfully. Jul 12 00:26:55.402000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.26.167:22-147.75.109.163:59346 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:26:55.405892 systemd-logind[1726]: Session 17 logged out. Waiting for processes to exit. Jul 12 00:26:55.408906 systemd-logind[1726]: Removed session 17. Jul 12 00:26:55.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.26.167:22-147.75.109.163:59350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:26:55.424776 systemd[1]: Started sshd@17-172.31.26.167:22-147.75.109.163:59350.service. Jul 12 00:26:55.604000 audit[5974]: USER_ACCT pid=5974 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:55.606187 sshd[5974]: Accepted publickey for core from 147.75.109.163 port 59350 ssh2: RSA SHA256:hAayEOBHnTpwll2xPQSU8cSp7XCWn/pXChvPbqogNKA Jul 12 00:26:55.606000 audit[5974]: CRED_ACQ pid=5974 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:55.606000 audit[5974]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe923b6a0 a2=3 a3=1 items=0 ppid=1 pid=5974 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:55.606000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 12 00:26:55.609809 sshd[5974]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 12 00:26:55.627469 systemd-logind[1726]: New session 18 of user core. Jul 12 00:26:55.628922 systemd[1]: Started session-18.scope. Jul 12 00:26:55.639000 audit[5974]: USER_START pid=5974 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:55.642000 audit[5978]: CRED_ACQ pid=5978 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:26:59.525234 kubelet[2742]: I0712 00:26:59.525186 2742 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 12 00:26:59.815000 audit[5990]: NETFILTER_CFG table=filter:130 family=2 entries=8 op=nft_register_rule pid=5990 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:26:59.818299 kernel: kauditd_printk_skb: 20 callbacks suppressed Jul 12 00:26:59.818458 kernel: audit: type=1325 audit(1752280019.815:1565): table=filter:130 family=2 entries=8 op=nft_register_rule pid=5990 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:26:59.815000 audit[5990]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=fffff69baae0 a2=0 a3=1 items=0 ppid=2843 pid=5990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:59.836773 kernel: audit: type=1300 audit(1752280019.815:1565): arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=fffff69baae0 a2=0 a3=1 items=0 ppid=2843 pid=5990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:59.815000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:26:59.848718 kernel: audit: type=1327 audit(1752280019.815:1565): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:26:59.852000 audit[5990]: NETFILTER_CFG table=nat:131 family=2 entries=38 op=nft_register_chain pid=5990 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:26:59.860725 kernel: audit: type=1325 audit(1752280019.852:1566): table=nat:131 family=2 entries=38 op=nft_register_chain pid=5990 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:26:59.852000 audit[5990]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=12772 a0=3 a1=fffff69baae0 a2=0 a3=1 items=0 ppid=2843 pid=5990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:59.874725 kernel: audit: type=1300 audit(1752280019.852:1566): arch=c00000b7 syscall=211 success=yes exit=12772 a0=3 a1=fffff69baae0 a2=0 a3=1 items=0 ppid=2843 pid=5990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:26:59.852000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:26:59.881723 kernel: audit: type=1327 audit(1752280019.852:1566): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:27:00.013812 sshd[5974]: pam_unix(sshd:session): session closed for user core Jul 12 00:27:00.017000 audit[5974]: USER_END pid=5974 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:00.018000 audit[5974]: CRED_DISP pid=5974 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:00.044880 kernel: audit: type=1106 audit(1752280020.017:1567): pid=5974 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:00.045024 kernel: audit: type=1104 audit(1752280020.018:1568): pid=5974 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:00.049538 systemd[1]: Started sshd@18-172.31.26.167:22-147.75.109.163:54096.service. Jul 12 00:27:00.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.26.167:22-147.75.109.163:54096 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:27:00.054161 systemd[1]: sshd@17-172.31.26.167:22-147.75.109.163:59350.service: Deactivated successfully. Jul 12 00:27:00.056475 systemd[1]: session-18.scope: Deactivated successfully. Jul 12 00:27:00.057412 systemd[1]: session-18.scope: Consumed 1.142s CPU time. Jul 12 00:27:00.060651 kernel: audit: type=1130 audit(1752280020.049:1569): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.26.167:22-147.75.109.163:54096 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:27:00.061922 systemd-logind[1726]: Session 18 logged out. Waiting for processes to exit. Jul 12 00:27:00.066930 systemd-logind[1726]: Removed session 18. Jul 12 00:27:00.054000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.26.167:22-147.75.109.163:59350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:27:00.082017 kernel: audit: type=1131 audit(1752280020.054:1570): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.26.167:22-147.75.109.163:59350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:27:00.166241 systemd[1]: run-containerd-runc-k8s.io-daae4e7880241fbbba6154d4da6b9ef3ae40235ca1ab0051ec06c9b6d4a26e85-runc.Ejx44J.mount: Deactivated successfully. Jul 12 00:27:00.294000 audit[5993]: USER_ACCT pid=5993 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:00.295836 sshd[5993]: Accepted publickey for core from 147.75.109.163 port 54096 ssh2: RSA SHA256:hAayEOBHnTpwll2xPQSU8cSp7XCWn/pXChvPbqogNKA Jul 12 00:27:00.298000 audit[5993]: CRED_ACQ pid=5993 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:00.298000 audit[5993]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcbb71b10 a2=3 a3=1 items=0 ppid=1 pid=5993 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:27:00.298000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 12 00:27:00.299980 sshd[5993]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 12 00:27:00.301000 audit[6011]: NETFILTER_CFG table=filter:132 family=2 entries=20 op=nft_register_rule pid=6011 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:27:00.312341 systemd-logind[1726]: New session 19 of user core. Jul 12 00:27:00.313459 systemd[1]: Started session-19.scope. Jul 12 00:27:00.301000 audit[6011]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffdcb893c0 a2=0 a3=1 items=0 ppid=2843 pid=6011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:27:00.301000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:27:00.319000 audit[6011]: NETFILTER_CFG table=nat:133 family=2 entries=26 op=nft_register_rule pid=6011 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:27:00.319000 audit[6011]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8076 a0=3 a1=ffffdcb893c0 a2=0 a3=1 items=0 ppid=2843 pid=6011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:27:00.319000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:27:00.347706 systemd[1]: run-containerd-runc-k8s.io-e28616d2390513d570ba65d4da702155d95a0dc52be5ad6ec6fa44fbd75de710-runc.pR5Crs.mount: Deactivated successfully. Jul 12 00:27:00.360000 audit[5993]: USER_START pid=5993 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:00.364000 audit[6022]: CRED_ACQ pid=6022 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:01.043211 sshd[5993]: pam_unix(sshd:session): session closed for user core Jul 12 00:27:01.044000 audit[5993]: USER_END pid=5993 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:01.045000 audit[5993]: CRED_DISP pid=5993 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:01.048000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.26.167:22-147.75.109.163:54096 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:27:01.048900 systemd-logind[1726]: Session 19 logged out. Waiting for processes to exit. Jul 12 00:27:01.049276 systemd[1]: sshd@18-172.31.26.167:22-147.75.109.163:54096.service: Deactivated successfully. Jul 12 00:27:01.050633 systemd[1]: session-19.scope: Deactivated successfully. Jul 12 00:27:01.053817 systemd-logind[1726]: Removed session 19. Jul 12 00:27:01.070206 systemd[1]: Started sshd@19-172.31.26.167:22-147.75.109.163:54106.service. Jul 12 00:27:01.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.26.167:22-147.75.109.163:54106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:27:01.254005 sshd[6039]: Accepted publickey for core from 147.75.109.163 port 54106 ssh2: RSA SHA256:hAayEOBHnTpwll2xPQSU8cSp7XCWn/pXChvPbqogNKA Jul 12 00:27:01.253000 audit[6039]: USER_ACCT pid=6039 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:01.255000 audit[6039]: CRED_ACQ pid=6039 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:01.255000 audit[6039]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe3122550 a2=3 a3=1 items=0 ppid=1 pid=6039 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:27:01.255000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 12 00:27:01.257189 sshd[6039]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 12 00:27:01.266917 systemd-logind[1726]: New session 20 of user core. Jul 12 00:27:01.268749 systemd[1]: Started session-20.scope. Jul 12 00:27:01.280000 audit[6039]: USER_START pid=6039 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:01.283000 audit[6041]: CRED_ACQ pid=6041 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:01.472000 audit[6049]: NETFILTER_CFG table=filter:134 family=2 entries=32 op=nft_register_rule pid=6049 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:27:01.472000 audit[6049]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffc1007060 a2=0 a3=1 items=0 ppid=2843 pid=6049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:27:01.472000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:27:01.513000 audit[6049]: NETFILTER_CFG table=nat:135 family=2 entries=26 op=nft_register_rule pid=6049 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:27:01.513000 audit[6049]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8076 a0=3 a1=ffffc1007060 a2=0 a3=1 items=0 ppid=2843 pid=6049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:27:01.513000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:27:01.585617 sshd[6039]: pam_unix(sshd:session): session closed for user core Jul 12 00:27:01.587000 audit[6039]: USER_END pid=6039 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:01.588000 audit[6039]: CRED_DISP pid=6039 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:01.592000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.26.167:22-147.75.109.163:54106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:27:01.591789 systemd-logind[1726]: Session 20 logged out. Waiting for processes to exit. Jul 12 00:27:01.592374 systemd[1]: sshd@19-172.31.26.167:22-147.75.109.163:54106.service: Deactivated successfully. Jul 12 00:27:01.594463 systemd[1]: session-20.scope: Deactivated successfully. Jul 12 00:27:01.596735 systemd-logind[1726]: Removed session 20. Jul 12 00:27:06.614497 systemd[1]: Started sshd@20-172.31.26.167:22-147.75.109.163:35302.service. Jul 12 00:27:06.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.26.167:22-147.75.109.163:35302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:27:06.621708 kernel: kauditd_printk_skb: 33 callbacks suppressed Jul 12 00:27:06.621868 kernel: audit: type=1130 audit(1752280026.614:1592): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.26.167:22-147.75.109.163:35302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:27:06.791000 audit[6052]: USER_ACCT pid=6052 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:06.792410 sshd[6052]: Accepted publickey for core from 147.75.109.163 port 35302 ssh2: RSA SHA256:hAayEOBHnTpwll2xPQSU8cSp7XCWn/pXChvPbqogNKA Jul 12 00:27:06.803000 audit[6052]: CRED_ACQ pid=6052 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:06.805472 sshd[6052]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 12 00:27:06.814623 kernel: audit: type=1101 audit(1752280026.791:1593): pid=6052 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:06.814804 kernel: audit: type=1103 audit(1752280026.803:1594): pid=6052 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:06.821489 kernel: audit: type=1006 audit(1752280026.803:1595): pid=6052 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Jul 12 00:27:06.803000 audit[6052]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffebf6ee90 a2=3 a3=1 items=0 ppid=1 pid=6052 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:27:06.835643 kernel: audit: type=1300 audit(1752280026.803:1595): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffebf6ee90 a2=3 a3=1 items=0 ppid=1 pid=6052 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:27:06.831089 systemd-logind[1726]: New session 21 of user core. Jul 12 00:27:06.836999 systemd[1]: Started session-21.scope. Jul 12 00:27:06.803000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 12 00:27:06.846040 kernel: audit: type=1327 audit(1752280026.803:1595): proctitle=737368643A20636F7265205B707269765D Jul 12 00:27:06.850000 audit[6052]: USER_START pid=6052 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:06.866634 kernel: audit: type=1105 audit(1752280026.850:1596): pid=6052 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:06.865000 audit[6054]: CRED_ACQ pid=6054 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:06.880796 kernel: audit: type=1103 audit(1752280026.865:1597): pid=6054 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:07.157419 sshd[6052]: pam_unix(sshd:session): session closed for user core Jul 12 00:27:07.158000 audit[6052]: USER_END pid=6052 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:07.173499 systemd[1]: sshd@20-172.31.26.167:22-147.75.109.163:35302.service: Deactivated successfully. Jul 12 00:27:07.174951 systemd[1]: session-21.scope: Deactivated successfully. Jul 12 00:27:07.177117 systemd-logind[1726]: Session 21 logged out. Waiting for processes to exit. Jul 12 00:27:07.180505 systemd-logind[1726]: Removed session 21. Jul 12 00:27:07.159000 audit[6052]: CRED_DISP pid=6052 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:07.191294 kernel: audit: type=1106 audit(1752280027.158:1598): pid=6052 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:07.191462 kernel: audit: type=1104 audit(1752280027.159:1599): pid=6052 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:07.173000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.26.167:22-147.75.109.163:35302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:27:08.115000 audit[6064]: NETFILTER_CFG table=filter:136 family=2 entries=20 op=nft_register_rule pid=6064 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:27:08.115000 audit[6064]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffcfd80e50 a2=0 a3=1 items=0 ppid=2843 pid=6064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:27:08.115000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:27:08.132000 audit[6064]: NETFILTER_CFG table=nat:137 family=2 entries=110 op=nft_register_chain pid=6064 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 12 00:27:08.132000 audit[6064]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=50988 a0=3 a1=ffffcfd80e50 a2=0 a3=1 items=0 ppid=2843 pid=6064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:27:08.132000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 12 00:27:12.197723 kernel: kauditd_printk_skb: 7 callbacks suppressed Jul 12 00:27:12.197905 kernel: audit: type=1130 audit(1752280032.191:1603): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.26.167:22-147.75.109.163:35308 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:27:12.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.26.167:22-147.75.109.163:35308 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:27:12.191471 systemd[1]: Started sshd@21-172.31.26.167:22-147.75.109.163:35308.service. Jul 12 00:27:12.387000 audit[6067]: USER_ACCT pid=6067 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:12.388535 sshd[6067]: Accepted publickey for core from 147.75.109.163 port 35308 ssh2: RSA SHA256:hAayEOBHnTpwll2xPQSU8cSp7XCWn/pXChvPbqogNKA Jul 12 00:27:12.391711 sshd[6067]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 12 00:27:12.406787 systemd-logind[1726]: New session 22 of user core. Jul 12 00:27:12.409003 systemd[1]: Started session-22.scope. Jul 12 00:27:12.390000 audit[6067]: CRED_ACQ pid=6067 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:12.422579 kernel: audit: type=1101 audit(1752280032.387:1604): pid=6067 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:12.422771 kernel: audit: type=1103 audit(1752280032.390:1605): pid=6067 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:12.433482 kernel: audit: type=1006 audit(1752280032.390:1606): pid=6067 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Jul 12 00:27:12.390000 audit[6067]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffffcc3c90 a2=3 a3=1 items=0 ppid=1 pid=6067 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:27:12.449074 kernel: audit: type=1300 audit(1752280032.390:1606): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffffcc3c90 a2=3 a3=1 items=0 ppid=1 pid=6067 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:27:12.390000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 12 00:27:12.457187 kernel: audit: type=1327 audit(1752280032.390:1606): proctitle=737368643A20636F7265205B707269765D Jul 12 00:27:12.437000 audit[6067]: USER_START pid=6067 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:12.470133 kernel: audit: type=1105 audit(1752280032.437:1607): pid=6067 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:12.450000 audit[6069]: CRED_ACQ pid=6069 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:12.484776 kernel: audit: type=1103 audit(1752280032.450:1608): pid=6069 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:12.733391 sshd[6067]: pam_unix(sshd:session): session closed for user core Jul 12 00:27:12.735000 audit[6067]: USER_END pid=6067 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:12.748436 systemd[1]: sshd@21-172.31.26.167:22-147.75.109.163:35308.service: Deactivated successfully. Jul 12 00:27:12.750535 systemd[1]: session-22.scope: Deactivated successfully. Jul 12 00:27:12.751891 systemd-logind[1726]: Session 22 logged out. Waiting for processes to exit. Jul 12 00:27:12.754276 systemd-logind[1726]: Removed session 22. Jul 12 00:27:12.735000 audit[6067]: CRED_DISP pid=6067 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:12.764879 kernel: audit: type=1106 audit(1752280032.735:1609): pid=6067 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:12.765056 kernel: audit: type=1104 audit(1752280032.735:1610): pid=6067 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:12.748000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.26.167:22-147.75.109.163:35308 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:27:15.092000 audit[2517]: AVC avc: denied { watch } for pid=2517 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=7346 scontext=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:27:15.092000 audit[2517]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=83 a1=4007582ea0 a2=fc6 a3=0 items=0 ppid=2367 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 key=(null) Jul 12 00:27:15.092000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 12 00:27:15.093000 audit[2517]: AVC avc: denied { watch } for pid=2517 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=7348 scontext=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:27:15.093000 audit[2517]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=83 a1=4007582f30 a2=fc6 a3=0 items=0 ppid=2367 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 key=(null) Jul 12 00:27:15.093000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 12 00:27:15.101000 audit[2517]: AVC avc: denied { watch } for pid=2517 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=7350 scontext=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:27:15.101000 audit[2517]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=83 a1=4007583d40 a2=fc6 a3=0 items=0 ppid=2367 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 key=(null) Jul 12 00:27:15.101000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 12 00:27:15.115000 audit[2517]: AVC avc: denied { watch } for pid=2517 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7344 scontext=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:27:15.115000 audit[2517]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=83 a1=4010e33700 a2=fc6 a3=0 items=0 ppid=2367 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 key=(null) Jul 12 00:27:15.115000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 12 00:27:15.132000 audit[2517]: AVC avc: denied { watch } for pid=2517 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7344 scontext=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:27:15.132000 audit[2517]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=83 a1=4010e33820 a2=fc6 a3=0 items=0 ppid=2367 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 key=(null) Jul 12 00:27:15.132000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 12 00:27:15.132000 audit[2517]: AVC avc: denied { watch } for pid=2517 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=7348 scontext=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:27:15.132000 audit[2517]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=83 a1=40187a0450 a2=fc6 a3=0 items=0 ppid=2367 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 key=(null) Jul 12 00:27:15.132000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 12 00:27:15.357000 audit[2485]: AVC avc: denied { watch } for pid=2485 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=7348 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:27:15.357000 audit[2485]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002b212c0 a2=fc6 a3=0 items=0 ppid=2324 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c411 key=(null) Jul 12 00:27:15.357000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 12 00:27:15.374000 audit[2485]: AVC avc: denied { watch } for pid=2485 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7344 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:27:15.374000 audit[2485]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400205dbc0 a2=fc6 a3=0 items=0 ppid=2324 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c411 key=(null) Jul 12 00:27:15.374000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 12 00:27:17.763287 kernel: kauditd_printk_skb: 25 callbacks suppressed Jul 12 00:27:17.763418 kernel: audit: type=1130 audit(1752280037.759:1620): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.26.167:22-147.75.109.163:33306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:27:17.759000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.26.167:22-147.75.109.163:33306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:27:17.760854 systemd[1]: Started sshd@22-172.31.26.167:22-147.75.109.163:33306.service. Jul 12 00:27:17.935000 audit[6080]: USER_ACCT pid=6080 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:17.938202 sshd[6080]: Accepted publickey for core from 147.75.109.163 port 33306 ssh2: RSA SHA256:hAayEOBHnTpwll2xPQSU8cSp7XCWn/pXChvPbqogNKA Jul 12 00:27:17.941747 sshd[6080]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 12 00:27:17.936000 audit[6080]: CRED_ACQ pid=6080 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:17.959444 kernel: audit: type=1101 audit(1752280037.935:1621): pid=6080 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:17.959595 kernel: audit: type=1103 audit(1752280037.936:1622): pid=6080 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:17.968265 kernel: audit: type=1006 audit(1752280037.936:1623): pid=6080 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Jul 12 00:27:17.974117 systemd-logind[1726]: New session 23 of user core. Jul 12 00:27:17.976853 systemd[1]: Started session-23.scope. Jul 12 00:27:17.936000 audit[6080]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff104a710 a2=3 a3=1 items=0 ppid=1 pid=6080 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:27:17.989353 kernel: audit: type=1300 audit(1752280037.936:1623): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff104a710 a2=3 a3=1 items=0 ppid=1 pid=6080 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:27:17.936000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 12 00:27:17.998874 kernel: audit: type=1327 audit(1752280037.936:1623): proctitle=737368643A20636F7265205B707269765D Jul 12 00:27:18.001000 audit[6080]: USER_START pid=6080 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:18.004000 audit[6082]: CRED_ACQ pid=6082 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:18.030943 kernel: audit: type=1105 audit(1752280038.001:1624): pid=6080 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:18.031095 kernel: audit: type=1103 audit(1752280038.004:1625): pid=6082 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:18.302698 sshd[6080]: pam_unix(sshd:session): session closed for user core Jul 12 00:27:18.303000 audit[6080]: USER_END pid=6080 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:18.317887 systemd[1]: sshd@22-172.31.26.167:22-147.75.109.163:33306.service: Deactivated successfully. Jul 12 00:27:18.319346 systemd[1]: session-23.scope: Deactivated successfully. Jul 12 00:27:18.303000 audit[6080]: CRED_DISP pid=6080 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:18.330313 kernel: audit: type=1106 audit(1752280038.303:1626): pid=6080 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:18.330455 kernel: audit: type=1104 audit(1752280038.303:1627): pid=6080 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:18.330462 systemd-logind[1726]: Session 23 logged out. Waiting for processes to exit. Jul 12 00:27:18.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.26.167:22-147.75.109.163:33306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:27:18.333616 systemd-logind[1726]: Removed session 23. Jul 12 00:27:19.209000 audit[2485]: AVC avc: denied { watch } for pid=2485 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7344 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:27:19.209000 audit[2485]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000a32260 a2=fc6 a3=0 items=0 ppid=2324 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c411 key=(null) Jul 12 00:27:19.209000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 12 00:27:19.219000 audit[2485]: AVC avc: denied { watch } for pid=2485 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7344 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:27:19.219000 audit[2485]: AVC avc: denied { watch } for pid=2485 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7344 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:27:19.219000 audit[2485]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400028d2e0 a2=fc6 a3=0 items=0 ppid=2324 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c411 key=(null) Jul 12 00:27:19.219000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 12 00:27:19.219000 audit[2485]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000a32480 a2=fc6 a3=0 items=0 ppid=2324 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c411 key=(null) Jul 12 00:27:19.219000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 12 00:27:19.226000 audit[2485]: AVC avc: denied { watch } for pid=2485 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7344 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:27:19.226000 audit[2485]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400028d3a0 a2=fc6 a3=0 items=0 ppid=2324 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c411 key=(null) Jul 12 00:27:19.226000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 12 00:27:19.282225 systemd[1]: run-containerd-runc-k8s.io-ce7f000cb5fd3fc6dc9878fadc29e9c96c86d05c2e400f262d530a55f62cf03b-runc.aD3EsP.mount: Deactivated successfully. Jul 12 00:27:23.333896 systemd[1]: Started sshd@23-172.31.26.167:22-147.75.109.163:33314.service. Jul 12 00:27:23.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.26.167:22-147.75.109.163:33314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:27:23.336913 kernel: kauditd_printk_skb: 13 callbacks suppressed Jul 12 00:27:23.337024 kernel: audit: type=1130 audit(1752280043.333:1633): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.26.167:22-147.75.109.163:33314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:27:23.521000 audit[6112]: USER_ACCT pid=6112 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:23.527159 sshd[6112]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 12 00:27:23.531413 sshd[6112]: Accepted publickey for core from 147.75.109.163 port 33314 ssh2: RSA SHA256:hAayEOBHnTpwll2xPQSU8cSp7XCWn/pXChvPbqogNKA Jul 12 00:27:23.542499 systemd-logind[1726]: New session 24 of user core. Jul 12 00:27:23.544890 systemd[1]: Started session-24.scope. Jul 12 00:27:23.551721 kernel: audit: type=1101 audit(1752280043.521:1634): pid=6112 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:23.551861 kernel: audit: type=1103 audit(1752280043.524:1635): pid=6112 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:23.524000 audit[6112]: CRED_ACQ pid=6112 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:23.571915 kernel: audit: type=1006 audit(1752280043.524:1636): pid=6112 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Jul 12 00:27:23.524000 audit[6112]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffa05e8a0 a2=3 a3=1 items=0 ppid=1 pid=6112 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:27:23.583543 kernel: audit: type=1300 audit(1752280043.524:1636): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffa05e8a0 a2=3 a3=1 items=0 ppid=1 pid=6112 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:27:23.524000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 12 00:27:23.588217 kernel: audit: type=1327 audit(1752280043.524:1636): proctitle=737368643A20636F7265205B707269765D Jul 12 00:27:23.582000 audit[6112]: USER_START pid=6112 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:23.600928 kernel: audit: type=1105 audit(1752280043.582:1637): pid=6112 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:23.601056 kernel: audit: type=1103 audit(1752280043.587:1638): pid=6114 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:23.587000 audit[6114]: CRED_ACQ pid=6114 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:23.934087 sshd[6112]: pam_unix(sshd:session): session closed for user core Jul 12 00:27:23.934000 audit[6112]: USER_END pid=6112 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:23.948709 systemd[1]: sshd@23-172.31.26.167:22-147.75.109.163:33314.service: Deactivated successfully. Jul 12 00:27:23.950121 systemd[1]: session-24.scope: Deactivated successfully. Jul 12 00:27:23.952230 systemd-logind[1726]: Session 24 logged out. Waiting for processes to exit. Jul 12 00:27:23.954213 systemd-logind[1726]: Removed session 24. Jul 12 00:27:23.935000 audit[6112]: CRED_DISP pid=6112 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:23.964882 kernel: audit: type=1106 audit(1752280043.934:1639): pid=6112 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:23.965058 kernel: audit: type=1104 audit(1752280043.935:1640): pid=6112 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:23.947000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.26.167:22-147.75.109.163:33314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:27:25.662000 audit[5309]: AVC avc: denied { watch } for pid=5309 comm="apiserver" path="/calico-apiserver-certs/..2025_07_12_00_26_00.2319783168/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c686,c788 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c686,c788 tclass=file permissive=0 Jul 12 00:27:25.662000 audit[5309]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40017c3ea0 a2=fc6 a3=0 items=0 ppid=4332 pid=5309 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c686,c788 key=(null) Jul 12 00:27:25.662000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 12 00:27:25.753159 systemd[1]: run-containerd-runc-k8s.io-e28616d2390513d570ba65d4da702155d95a0dc52be5ad6ec6fa44fbd75de710-runc.vK5bul.mount: Deactivated successfully. Jul 12 00:27:28.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.26.167:22-147.75.109.163:38918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:27:28.975360 systemd[1]: Started sshd@24-172.31.26.167:22-147.75.109.163:38918.service. Jul 12 00:27:28.977691 kernel: kauditd_printk_skb: 4 callbacks suppressed Jul 12 00:27:28.977803 kernel: audit: type=1130 audit(1752280048.974:1643): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.26.167:22-147.75.109.163:38918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:27:29.192000 audit[6145]: USER_ACCT pid=6145 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:29.196267 sshd[6145]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 12 00:27:29.206609 sshd[6145]: Accepted publickey for core from 147.75.109.163 port 38918 ssh2: RSA SHA256:hAayEOBHnTpwll2xPQSU8cSp7XCWn/pXChvPbqogNKA Jul 12 00:27:29.194000 audit[6145]: CRED_ACQ pid=6145 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:29.218535 kernel: audit: type=1101 audit(1752280049.192:1644): pid=6145 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:29.218666 kernel: audit: type=1103 audit(1752280049.194:1645): pid=6145 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:29.228586 kernel: audit: type=1006 audit(1752280049.194:1646): pid=6145 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Jul 12 00:27:29.228802 kernel: audit: type=1300 audit(1752280049.194:1646): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff022f910 a2=3 a3=1 items=0 ppid=1 pid=6145 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:27:29.194000 audit[6145]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff022f910 a2=3 a3=1 items=0 ppid=1 pid=6145 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:27:29.227742 systemd[1]: Started session-25.scope. Jul 12 00:27:29.235779 systemd-logind[1726]: New session 25 of user core. Jul 12 00:27:29.194000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 12 00:27:29.245769 kernel: audit: type=1327 audit(1752280049.194:1646): proctitle=737368643A20636F7265205B707269765D Jul 12 00:27:29.252000 audit[6145]: USER_START pid=6145 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:29.254000 audit[6147]: CRED_ACQ pid=6147 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:29.274019 kernel: audit: type=1105 audit(1752280049.252:1647): pid=6145 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:29.274134 kernel: audit: type=1103 audit(1752280049.254:1648): pid=6147 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:29.540017 sshd[6145]: pam_unix(sshd:session): session closed for user core Jul 12 00:27:29.542000 audit[6145]: USER_END pid=6145 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:29.557865 systemd-logind[1726]: Session 25 logged out. Waiting for processes to exit. Jul 12 00:27:29.560087 systemd[1]: sshd@24-172.31.26.167:22-147.75.109.163:38918.service: Deactivated successfully. Jul 12 00:27:29.561527 systemd[1]: session-25.scope: Deactivated successfully. Jul 12 00:27:29.562993 systemd-logind[1726]: Removed session 25. Jul 12 00:27:29.542000 audit[6145]: CRED_DISP pid=6145 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:29.573513 kernel: audit: type=1106 audit(1752280049.542:1649): pid=6145 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:29.573779 kernel: audit: type=1104 audit(1752280049.542:1650): pid=6145 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:29.559000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.26.167:22-147.75.109.163:38918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:27:30.180365 systemd[1]: run-containerd-runc-k8s.io-daae4e7880241fbbba6154d4da6b9ef3ae40235ca1ab0051ec06c9b6d4a26e85-runc.v76gIH.mount: Deactivated successfully. Jul 12 00:27:33.049983 systemd[1]: run-containerd-runc-k8s.io-daae4e7880241fbbba6154d4da6b9ef3ae40235ca1ab0051ec06c9b6d4a26e85-runc.hepBKD.mount: Deactivated successfully. Jul 12 00:27:34.577907 systemd[1]: Started sshd@25-172.31.26.167:22-147.75.109.163:38932.service. Jul 12 00:27:34.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.26.167:22-147.75.109.163:38932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:27:34.580172 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 12 00:27:34.580333 kernel: audit: type=1130 audit(1752280054.577:1652): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.26.167:22-147.75.109.163:38932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:27:34.759000 audit[6218]: USER_ACCT pid=6218 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:34.762466 sshd[6218]: Accepted publickey for core from 147.75.109.163 port 38932 ssh2: RSA SHA256:hAayEOBHnTpwll2xPQSU8cSp7XCWn/pXChvPbqogNKA Jul 12 00:27:34.770000 audit[6218]: CRED_ACQ pid=6218 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:34.782002 kernel: audit: type=1101 audit(1752280054.759:1653): pid=6218 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:34.782152 kernel: audit: type=1103 audit(1752280054.770:1654): pid=6218 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:34.772291 sshd[6218]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 12 00:27:34.770000 audit[6218]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe4d92410 a2=3 a3=1 items=0 ppid=1 pid=6218 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:27:34.790810 kernel: audit: type=1006 audit(1752280054.770:1655): pid=6218 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Jul 12 00:27:34.770000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 12 00:27:34.806614 kernel: audit: type=1300 audit(1752280054.770:1655): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe4d92410 a2=3 a3=1 items=0 ppid=1 pid=6218 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:27:34.806783 kernel: audit: type=1327 audit(1752280054.770:1655): proctitle=737368643A20636F7265205B707269765D Jul 12 00:27:34.805806 systemd-logind[1726]: New session 26 of user core. Jul 12 00:27:34.808052 systemd[1]: Started session-26.scope. Jul 12 00:27:34.819000 audit[6218]: USER_START pid=6218 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:34.822000 audit[6220]: CRED_ACQ pid=6220 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:34.840994 kernel: audit: type=1105 audit(1752280054.819:1656): pid=6218 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:34.841169 kernel: audit: type=1103 audit(1752280054.822:1657): pid=6220 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:35.108070 sshd[6218]: pam_unix(sshd:session): session closed for user core Jul 12 00:27:35.109000 audit[6218]: USER_END pid=6218 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:35.113208 systemd[1]: session-26.scope: Deactivated successfully. Jul 12 00:27:35.114594 systemd[1]: sshd@25-172.31.26.167:22-147.75.109.163:38932.service: Deactivated successfully. Jul 12 00:27:35.123946 systemd-logind[1726]: Session 26 logged out. Waiting for processes to exit. Jul 12 00:27:35.125881 kernel: audit: type=1106 audit(1752280055.109:1658): pid=6218 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:35.126151 systemd-logind[1726]: Removed session 26. Jul 12 00:27:35.109000 audit[6218]: CRED_DISP pid=6218 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:35.109000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.26.167:22-147.75.109.163:38932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:27:35.142752 kernel: audit: type=1104 audit(1752280055.109:1659): pid=6218 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:37.388000 audit[5774]: AVC avc: denied { watch } for pid=5774 comm="apiserver" path="/calico-apiserver-certs/..2025_07_12_00_26_00.1994296424/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c215,c719 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c215,c719 tclass=file permissive=0 Jul 12 00:27:37.388000 audit[5774]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40018af6e0 a2=fc6 a3=0 items=0 ppid=4796 pid=5774 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c215,c719 key=(null) Jul 12 00:27:37.388000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 12 00:27:40.155470 kernel: kauditd_printk_skb: 4 callbacks suppressed Jul 12 00:27:40.155764 kernel: audit: type=1130 audit(1752280060.142:1662): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.26.167:22-147.75.109.163:35424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:27:40.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.26.167:22-147.75.109.163:35424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:27:40.142999 systemd[1]: Started sshd@26-172.31.26.167:22-147.75.109.163:35424.service. Jul 12 00:27:40.337271 sshd[6232]: Accepted publickey for core from 147.75.109.163 port 35424 ssh2: RSA SHA256:hAayEOBHnTpwll2xPQSU8cSp7XCWn/pXChvPbqogNKA Jul 12 00:27:40.336000 audit[6232]: USER_ACCT pid=6232 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:40.350171 sshd[6232]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 12 00:27:40.348000 audit[6232]: CRED_ACQ pid=6232 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:40.351879 kernel: audit: type=1101 audit(1752280060.336:1663): pid=6232 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:40.365130 kernel: audit: type=1103 audit(1752280060.348:1664): pid=6232 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:40.377257 systemd-logind[1726]: New session 27 of user core. Jul 12 00:27:40.379254 systemd[1]: Started session-27.scope. Jul 12 00:27:40.348000 audit[6232]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdf9c27b0 a2=3 a3=1 items=0 ppid=1 pid=6232 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:27:40.394698 kernel: audit: type=1006 audit(1752280060.348:1665): pid=6232 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Jul 12 00:27:40.394836 kernel: audit: type=1300 audit(1752280060.348:1665): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdf9c27b0 a2=3 a3=1 items=0 ppid=1 pid=6232 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:27:40.348000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 12 00:27:40.401749 kernel: audit: type=1327 audit(1752280060.348:1665): proctitle=737368643A20636F7265205B707269765D Jul 12 00:27:40.416000 audit[6232]: USER_START pid=6232 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:40.429000 audit[6235]: CRED_ACQ pid=6235 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:40.446859 kernel: audit: type=1105 audit(1752280060.416:1666): pid=6232 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:40.447010 kernel: audit: type=1103 audit(1752280060.429:1667): pid=6235 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:40.721019 sshd[6232]: pam_unix(sshd:session): session closed for user core Jul 12 00:27:40.723000 audit[6232]: USER_END pid=6232 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:40.726933 systemd[1]: session-27.scope: Deactivated successfully. Jul 12 00:27:40.728369 systemd[1]: sshd@26-172.31.26.167:22-147.75.109.163:35424.service: Deactivated successfully. Jul 12 00:27:40.738374 systemd-logind[1726]: Session 27 logged out. Waiting for processes to exit. Jul 12 00:27:40.723000 audit[6232]: CRED_DISP pid=6232 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:40.749717 kernel: audit: type=1106 audit(1752280060.723:1668): pid=6232 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:40.749921 kernel: audit: type=1104 audit(1752280060.723:1669): pid=6232 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 12 00:27:40.750145 systemd-logind[1726]: Removed session 27. Jul 12 00:27:40.724000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.26.167:22-147.75.109.163:35424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 12 00:27:55.305608 systemd[1]: cri-containerd-909dbde8e0812e0f7e5737bb421c525c3b1081ed59a1760ea97c8595dd6ecb2a.scope: Deactivated successfully. Jul 12 00:27:55.306207 systemd[1]: cri-containerd-909dbde8e0812e0f7e5737bb421c525c3b1081ed59a1760ea97c8595dd6ecb2a.scope: Consumed 26.717s CPU time. Jul 12 00:27:55.305000 audit: BPF prog-id=117 op=UNLOAD Jul 12 00:27:55.310733 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 12 00:27:55.310853 kernel: audit: type=1334 audit(1752280075.305:1671): prog-id=117 op=UNLOAD Jul 12 00:27:55.313000 audit: BPF prog-id=120 op=UNLOAD Jul 12 00:27:55.320733 kernel: audit: type=1334 audit(1752280075.313:1672): prog-id=120 op=UNLOAD Jul 12 00:27:55.358525 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-909dbde8e0812e0f7e5737bb421c525c3b1081ed59a1760ea97c8595dd6ecb2a-rootfs.mount: Deactivated successfully. Jul 12 00:27:55.360800 env[1733]: time="2025-07-12T00:27:55.360699302Z" level=info msg="shim disconnected" id=909dbde8e0812e0f7e5737bb421c525c3b1081ed59a1760ea97c8595dd6ecb2a Jul 12 00:27:55.361443 env[1733]: time="2025-07-12T00:27:55.361407348Z" level=warning msg="cleaning up after shim disconnected" id=909dbde8e0812e0f7e5737bb421c525c3b1081ed59a1760ea97c8595dd6ecb2a namespace=k8s.io Jul 12 00:27:55.361603 env[1733]: time="2025-07-12T00:27:55.361575092Z" level=info msg="cleaning up dead shim" Jul 12 00:27:55.375010 env[1733]: time="2025-07-12T00:27:55.374950527Z" level=warning msg="cleanup warnings time=\"2025-07-12T00:27:55Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6295 runtime=io.containerd.runc.v2\n" Jul 12 00:27:55.957955 systemd[1]: cri-containerd-ad6611a8d3b468e05bdcf79dfb454adde7fbb9af873d12d9929bebb4f160e035.scope: Deactivated successfully. Jul 12 00:27:55.958563 systemd[1]: cri-containerd-ad6611a8d3b468e05bdcf79dfb454adde7fbb9af873d12d9929bebb4f160e035.scope: Consumed 6.133s CPU time. Jul 12 00:27:55.970278 kernel: audit: type=1334 audit(1752280075.964:1673): prog-id=76 op=UNLOAD Jul 12 00:27:55.970473 kernel: audit: type=1334 audit(1752280075.964:1674): prog-id=105 op=UNLOAD Jul 12 00:27:55.964000 audit: BPF prog-id=76 op=UNLOAD Jul 12 00:27:55.964000 audit: BPF prog-id=105 op=UNLOAD Jul 12 00:27:56.016401 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ad6611a8d3b468e05bdcf79dfb454adde7fbb9af873d12d9929bebb4f160e035-rootfs.mount: Deactivated successfully. Jul 12 00:27:56.018515 env[1733]: time="2025-07-12T00:27:56.018433291Z" level=info msg="shim disconnected" id=ad6611a8d3b468e05bdcf79dfb454adde7fbb9af873d12d9929bebb4f160e035 Jul 12 00:27:56.018981 env[1733]: time="2025-07-12T00:27:56.018943604Z" level=warning msg="cleaning up after shim disconnected" id=ad6611a8d3b468e05bdcf79dfb454adde7fbb9af873d12d9929bebb4f160e035 namespace=k8s.io Jul 12 00:27:56.019116 env[1733]: time="2025-07-12T00:27:56.019088523Z" level=info msg="cleaning up dead shim" Jul 12 00:27:56.033817 env[1733]: time="2025-07-12T00:27:56.033759805Z" level=warning msg="cleanup warnings time=\"2025-07-12T00:27:56Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6322 runtime=io.containerd.runc.v2\n" Jul 12 00:27:56.095080 kubelet[2742]: I0712 00:27:56.094626 2742 scope.go:117] "RemoveContainer" containerID="ad6611a8d3b468e05bdcf79dfb454adde7fbb9af873d12d9929bebb4f160e035" Jul 12 00:27:56.099654 env[1733]: time="2025-07-12T00:27:56.099272276Z" level=info msg="CreateContainer within sandbox \"ba00b409df6b147591e3345339e2753e050577d64d9814e9c7b7217c2226862f\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Jul 12 00:27:56.102955 kubelet[2742]: I0712 00:27:56.102913 2742 scope.go:117] "RemoveContainer" containerID="909dbde8e0812e0f7e5737bb421c525c3b1081ed59a1760ea97c8595dd6ecb2a" Jul 12 00:27:56.107168 env[1733]: time="2025-07-12T00:27:56.107101573Z" level=info msg="CreateContainer within sandbox \"20efdbf35623298cc6446b2baae511c774dcb207b4573915d0698b4d8f382c37\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Jul 12 00:27:56.158892 env[1733]: time="2025-07-12T00:27:56.158807908Z" level=info msg="CreateContainer within sandbox \"ba00b409df6b147591e3345339e2753e050577d64d9814e9c7b7217c2226862f\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"f2993391149e163c15f02ecf45c1722c6ef956acc01eceabca9535fc1ae2efde\"" Jul 12 00:27:56.170320 env[1733]: time="2025-07-12T00:27:56.169906762Z" level=info msg="StartContainer for \"f2993391149e163c15f02ecf45c1722c6ef956acc01eceabca9535fc1ae2efde\"" Jul 12 00:27:56.178816 env[1733]: time="2025-07-12T00:27:56.178751487Z" level=info msg="CreateContainer within sandbox \"20efdbf35623298cc6446b2baae511c774dcb207b4573915d0698b4d8f382c37\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"0b4f904caa5392760706f30c012465f71d66518ac9a56aa49b94645ad75b6e14\"" Jul 12 00:27:56.179992 env[1733]: time="2025-07-12T00:27:56.179918232Z" level=info msg="StartContainer for \"0b4f904caa5392760706f30c012465f71d66518ac9a56aa49b94645ad75b6e14\"" Jul 12 00:27:56.215326 systemd[1]: Started cri-containerd-f2993391149e163c15f02ecf45c1722c6ef956acc01eceabca9535fc1ae2efde.scope. Jul 12 00:27:56.241644 systemd[1]: Started cri-containerd-0b4f904caa5392760706f30c012465f71d66518ac9a56aa49b94645ad75b6e14.scope. Jul 12 00:27:56.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.286790 kernel: audit: type=1400 audit(1752280076.275:1675): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.307722 kernel: audit: type=1400 audit(1752280076.275:1676): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.307862 kernel: audit: type=1400 audit(1752280076.275:1677): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.322159 kernel: audit: type=1400 audit(1752280076.275:1678): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.336801 kernel: audit: type=1400 audit(1752280076.275:1679): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.345103 kernel: audit: type=1400 audit(1752280076.275:1680): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.283000 audit: BPF prog-id=234 op=LOAD Jul 12 00:27:56.283000 audit[6344]: AVC avc: denied { bpf } for pid=6344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.283000 audit[6344]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2324 pid=6344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:27:56.283000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632393933333931313439653136336331356630326563663435633137 Jul 12 00:27:56.284000 audit[6344]: AVC avc: denied { perfmon } for pid=6344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.284000 audit[6344]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2324 pid=6344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:27:56.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632393933333931313439653136336331356630326563663435633137 Jul 12 00:27:56.284000 audit[6344]: AVC avc: denied { bpf } for pid=6344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.284000 audit[6344]: AVC avc: denied { bpf } for pid=6344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.284000 audit[6344]: AVC avc: denied { bpf } for pid=6344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.284000 audit[6344]: AVC avc: denied { perfmon } for pid=6344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.284000 audit[6344]: AVC avc: denied { perfmon } for pid=6344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.284000 audit[6344]: AVC avc: denied { perfmon } for pid=6344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.284000 audit[6344]: AVC avc: denied { perfmon } for pid=6344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.284000 audit[6344]: AVC avc: denied { perfmon } for pid=6344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.284000 audit[6344]: AVC avc: denied { bpf } for pid=6344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.284000 audit[6344]: AVC avc: denied { bpf } for pid=6344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.284000 audit: BPF prog-id=235 op=LOAD Jul 12 00:27:56.284000 audit[6344]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2324 pid=6344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:27:56.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632393933333931313439653136336331356630326563663435633137 Jul 12 00:27:56.284000 audit[6344]: AVC avc: denied { bpf } for pid=6344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.284000 audit[6344]: AVC avc: denied { bpf } for pid=6344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.284000 audit[6344]: AVC avc: denied { perfmon } for pid=6344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.284000 audit[6344]: AVC avc: denied { perfmon } for pid=6344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.284000 audit[6344]: AVC avc: denied { perfmon } for pid=6344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.284000 audit[6344]: AVC avc: denied { perfmon } for pid=6344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.284000 audit[6344]: AVC avc: denied { perfmon } for pid=6344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.284000 audit[6344]: AVC avc: denied { bpf } for pid=6344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.284000 audit[6344]: AVC avc: denied { bpf } for pid=6344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.284000 audit: BPF prog-id=236 op=LOAD Jul 12 00:27:56.284000 audit[6344]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2324 pid=6344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:27:56.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632393933333931313439653136336331356630326563663435633137 Jul 12 00:27:56.284000 audit: BPF prog-id=236 op=UNLOAD Jul 12 00:27:56.284000 audit: BPF prog-id=235 op=UNLOAD Jul 12 00:27:56.284000 audit[6344]: AVC avc: denied { bpf } for pid=6344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.284000 audit[6344]: AVC avc: denied { bpf } for pid=6344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.284000 audit[6344]: AVC avc: denied { bpf } for pid=6344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.284000 audit[6344]: AVC avc: denied { perfmon } for pid=6344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.284000 audit[6344]: AVC avc: denied { perfmon } for pid=6344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.284000 audit[6344]: AVC avc: denied { perfmon } for pid=6344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.284000 audit[6344]: AVC avc: denied { perfmon } for pid=6344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.284000 audit[6344]: AVC avc: denied { perfmon } for pid=6344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.284000 audit[6344]: AVC avc: denied { bpf } for pid=6344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.284000 audit[6344]: AVC avc: denied { bpf } for pid=6344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.284000 audit: BPF prog-id=237 op=LOAD Jul 12 00:27:56.284000 audit[6344]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2324 pid=6344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:27:56.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632393933333931313439653136336331356630326563663435633137 Jul 12 00:27:56.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.348000 audit: BPF prog-id=238 op=LOAD Jul 12 00:27:56.360000 audit[6354]: AVC avc: denied { bpf } for pid=6354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.360000 audit[6354]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=2999 pid=6354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:27:56.360000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062346639303463616135333932373630373036663330633031323436 Jul 12 00:27:56.361000 audit[6354]: AVC avc: denied { perfmon } for pid=6354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.361000 audit[6354]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2999 pid=6354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:27:56.361000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062346639303463616135333932373630373036663330633031323436 Jul 12 00:27:56.361000 audit[6354]: AVC avc: denied { bpf } for pid=6354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.361000 audit[6354]: AVC avc: denied { bpf } for pid=6354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.361000 audit[6354]: AVC avc: denied { bpf } for pid=6354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.361000 audit[6354]: AVC avc: denied { perfmon } for pid=6354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.361000 audit[6354]: AVC avc: denied { perfmon } for pid=6354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.361000 audit[6354]: AVC avc: denied { perfmon } for pid=6354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.361000 audit[6354]: AVC avc: denied { perfmon } for pid=6354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.361000 audit[6354]: AVC avc: denied { perfmon } for pid=6354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.361000 audit[6354]: AVC avc: denied { bpf } for pid=6354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.361000 audit[6354]: AVC avc: denied { bpf } for pid=6354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.361000 audit: BPF prog-id=239 op=LOAD Jul 12 00:27:56.361000 audit[6354]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2999 pid=6354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:27:56.361000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062346639303463616135333932373630373036663330633031323436 Jul 12 00:27:56.364000 audit[6354]: AVC avc: denied { bpf } for pid=6354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.364000 audit[6354]: AVC avc: denied { bpf } for pid=6354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.364000 audit[6354]: AVC avc: denied { perfmon } for pid=6354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.364000 audit[6354]: AVC avc: denied { perfmon } for pid=6354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.364000 audit[6354]: AVC avc: denied { perfmon } for pid=6354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.364000 audit[6354]: AVC avc: denied { perfmon } for pid=6354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.364000 audit[6354]: AVC avc: denied { perfmon } for pid=6354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.364000 audit[6354]: AVC avc: denied { bpf } for pid=6354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.364000 audit[6354]: AVC avc: denied { bpf } for pid=6354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.364000 audit: BPF prog-id=240 op=LOAD Jul 12 00:27:56.364000 audit[6354]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2999 pid=6354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:27:56.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062346639303463616135333932373630373036663330633031323436 Jul 12 00:27:56.365000 audit: BPF prog-id=240 op=UNLOAD Jul 12 00:27:56.365000 audit: BPF prog-id=239 op=UNLOAD Jul 12 00:27:56.365000 audit[6354]: AVC avc: denied { bpf } for pid=6354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.365000 audit[6354]: AVC avc: denied { bpf } for pid=6354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.365000 audit[6354]: AVC avc: denied { bpf } for pid=6354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.365000 audit[6354]: AVC avc: denied { perfmon } for pid=6354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.365000 audit[6354]: AVC avc: denied { perfmon } for pid=6354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.365000 audit[6354]: AVC avc: denied { perfmon } for pid=6354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.365000 audit[6354]: AVC avc: denied { perfmon } for pid=6354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.365000 audit[6354]: AVC avc: denied { perfmon } for pid=6354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.365000 audit[6354]: AVC avc: denied { bpf } for pid=6354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.365000 audit[6354]: AVC avc: denied { bpf } for pid=6354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:27:56.365000 audit: BPF prog-id=241 op=LOAD Jul 12 00:27:56.365000 audit[6354]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2999 pid=6354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:27:56.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062346639303463616135333932373630373036663330633031323436 Jul 12 00:27:56.399946 env[1733]: time="2025-07-12T00:27:56.399792173Z" level=info msg="StartContainer for \"0b4f904caa5392760706f30c012465f71d66518ac9a56aa49b94645ad75b6e14\" returns successfully" Jul 12 00:27:56.410974 env[1733]: time="2025-07-12T00:27:56.410886694Z" level=info msg="StartContainer for \"f2993391149e163c15f02ecf45c1722c6ef956acc01eceabca9535fc1ae2efde\" returns successfully" Jul 12 00:27:58.355190 update_engine[1727]: I0712 00:27:58.355033 1727 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Jul 12 00:27:58.355190 update_engine[1727]: I0712 00:27:58.355105 1727 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Jul 12 00:27:58.358860 update_engine[1727]: I0712 00:27:58.357801 1727 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Jul 12 00:27:58.358860 update_engine[1727]: I0712 00:27:58.358721 1727 omaha_request_params.cc:62] Current group set to lts Jul 12 00:27:58.361564 update_engine[1727]: I0712 00:27:58.361224 1727 update_attempter.cc:499] Already updated boot flags. Skipping. Jul 12 00:27:58.361564 update_engine[1727]: I0712 00:27:58.361254 1727 update_attempter.cc:643] Scheduling an action processor start. Jul 12 00:27:58.361564 update_engine[1727]: I0712 00:27:58.361282 1727 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Jul 12 00:27:58.361564 update_engine[1727]: I0712 00:27:58.361348 1727 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Jul 12 00:27:58.362651 update_engine[1727]: I0712 00:27:58.362488 1727 omaha_request_action.cc:270] Posting an Omaha request to disabled Jul 12 00:27:58.362651 update_engine[1727]: I0712 00:27:58.362514 1727 omaha_request_action.cc:271] Request: Jul 12 00:27:58.362651 update_engine[1727]: Jul 12 00:27:58.362651 update_engine[1727]: Jul 12 00:27:58.362651 update_engine[1727]: Jul 12 00:27:58.362651 update_engine[1727]: Jul 12 00:27:58.362651 update_engine[1727]: Jul 12 00:27:58.362651 update_engine[1727]: Jul 12 00:27:58.362651 update_engine[1727]: Jul 12 00:27:58.362651 update_engine[1727]: Jul 12 00:27:58.362651 update_engine[1727]: I0712 00:27:58.362527 1727 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Jul 12 00:27:58.365086 locksmithd[1795]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Jul 12 00:27:58.372120 update_engine[1727]: I0712 00:27:58.372080 1727 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Jul 12 00:27:58.372718 update_engine[1727]: I0712 00:27:58.372670 1727 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Jul 12 00:27:58.405652 update_engine[1727]: E0712 00:27:58.405611 1727 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Jul 12 00:27:58.406018 update_engine[1727]: I0712 00:27:58.405992 1727 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Jul 12 00:27:59.249521 systemd[1]: cri-containerd-36b93d5d0d3f1756bc0de69f371b14450a878df2d5b7eed2b8b12a23489e6bfb.scope: Deactivated successfully. Jul 12 00:27:59.250103 systemd[1]: cri-containerd-36b93d5d0d3f1756bc0de69f371b14450a878df2d5b7eed2b8b12a23489e6bfb.scope: Consumed 3.866s CPU time. Jul 12 00:27:59.256000 audit: BPF prog-id=80 op=UNLOAD Jul 12 00:27:59.256000 audit: BPF prog-id=90 op=UNLOAD Jul 12 00:27:59.290422 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-36b93d5d0d3f1756bc0de69f371b14450a878df2d5b7eed2b8b12a23489e6bfb-rootfs.mount: Deactivated successfully. Jul 12 00:27:59.297117 env[1733]: time="2025-07-12T00:27:59.297042050Z" level=info msg="shim disconnected" id=36b93d5d0d3f1756bc0de69f371b14450a878df2d5b7eed2b8b12a23489e6bfb Jul 12 00:27:59.297656 env[1733]: time="2025-07-12T00:27:59.297116993Z" level=warning msg="cleaning up after shim disconnected" id=36b93d5d0d3f1756bc0de69f371b14450a878df2d5b7eed2b8b12a23489e6bfb namespace=k8s.io Jul 12 00:27:59.297656 env[1733]: time="2025-07-12T00:27:59.297139890Z" level=info msg="cleaning up dead shim" Jul 12 00:27:59.314466 env[1733]: time="2025-07-12T00:27:59.314386608Z" level=warning msg="cleanup warnings time=\"2025-07-12T00:27:59Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6417 runtime=io.containerd.runc.v2\ntime=\"2025-07-12T00:27:59Z\" level=warning msg=\"failed to remove runc container\" error=\"runc did not terminate successfully: exit status 255: \" runtime=io.containerd.runc.v2\n" Jul 12 00:28:00.124532 kubelet[2742]: I0712 00:28:00.124470 2742 scope.go:117] "RemoveContainer" containerID="36b93d5d0d3f1756bc0de69f371b14450a878df2d5b7eed2b8b12a23489e6bfb" Jul 12 00:28:00.130034 env[1733]: time="2025-07-12T00:28:00.129948367Z" level=info msg="CreateContainer within sandbox \"17a4962b87dfb67d833a32f5247b51a23062e1df0e868ccc81d4dcc21b126a11\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Jul 12 00:28:00.174496 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount240718047.mount: Deactivated successfully. Jul 12 00:28:00.186199 env[1733]: time="2025-07-12T00:28:00.186139382Z" level=info msg="CreateContainer within sandbox \"17a4962b87dfb67d833a32f5247b51a23062e1df0e868ccc81d4dcc21b126a11\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"6f071e7a06887d8e34a3fb336bf0f5d5be3bf68a33d8026282dec0c550d05998\"" Jul 12 00:28:00.188071 env[1733]: time="2025-07-12T00:28:00.187989355Z" level=info msg="StartContainer for \"6f071e7a06887d8e34a3fb336bf0f5d5be3bf68a33d8026282dec0c550d05998\"" Jul 12 00:28:00.283596 systemd[1]: Started cri-containerd-6f071e7a06887d8e34a3fb336bf0f5d5be3bf68a33d8026282dec0c550d05998.scope. Jul 12 00:28:00.361744 kernel: kauditd_printk_skb: 110 callbacks suppressed Jul 12 00:28:00.361908 kernel: audit: type=1400 audit(1752280080.351:1713): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.372630 kernel: audit: type=1400 audit(1752280080.351:1714): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.386928 kernel: audit: type=1400 audit(1752280080.351:1715): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.402497 kernel: audit: type=1400 audit(1752280080.351:1716): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.402600 kernel: audit: type=1400 audit(1752280080.351:1717): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.412645 kernel: audit: type=1400 audit(1752280080.351:1718): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.421827 kernel: audit: type=1400 audit(1752280080.351:1719): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.431520 kernel: audit: type=1400 audit(1752280080.351:1720): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.446918 kernel: audit: type=1400 audit(1752280080.351:1721): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.447028 kernel: audit: type=1400 audit(1752280080.353:1722): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.353000 audit: BPF prog-id=242 op=LOAD Jul 12 00:28:00.362000 audit[6450]: AVC avc: denied { bpf } for pid=6450 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.362000 audit[6450]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2340 pid=6450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:28:00.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666303731653761303638383764386533346133666233333662663066 Jul 12 00:28:00.362000 audit[6450]: AVC avc: denied { perfmon } for pid=6450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.362000 audit[6450]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2340 pid=6450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:28:00.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666303731653761303638383764386533346133666233333662663066 Jul 12 00:28:00.362000 audit[6450]: AVC avc: denied { bpf } for pid=6450 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.362000 audit[6450]: AVC avc: denied { bpf } for pid=6450 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.362000 audit[6450]: AVC avc: denied { bpf } for pid=6450 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.362000 audit[6450]: AVC avc: denied { perfmon } for pid=6450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.362000 audit[6450]: AVC avc: denied { perfmon } for pid=6450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.362000 audit[6450]: AVC avc: denied { perfmon } for pid=6450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.362000 audit[6450]: AVC avc: denied { perfmon } for pid=6450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.362000 audit[6450]: AVC avc: denied { perfmon } for pid=6450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.362000 audit[6450]: AVC avc: denied { bpf } for pid=6450 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.362000 audit[6450]: AVC avc: denied { bpf } for pid=6450 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.362000 audit: BPF prog-id=243 op=LOAD Jul 12 00:28:00.362000 audit[6450]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2340 pid=6450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:28:00.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666303731653761303638383764386533346133666233333662663066 Jul 12 00:28:00.362000 audit[6450]: AVC avc: denied { bpf } for pid=6450 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.362000 audit[6450]: AVC avc: denied { bpf } for pid=6450 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.362000 audit[6450]: AVC avc: denied { perfmon } for pid=6450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.362000 audit[6450]: AVC avc: denied { perfmon } for pid=6450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.362000 audit[6450]: AVC avc: denied { perfmon } for pid=6450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.362000 audit[6450]: AVC avc: denied { perfmon } for pid=6450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.362000 audit[6450]: AVC avc: denied { perfmon } for pid=6450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.362000 audit[6450]: AVC avc: denied { bpf } for pid=6450 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.362000 audit[6450]: AVC avc: denied { bpf } for pid=6450 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.362000 audit: BPF prog-id=244 op=LOAD Jul 12 00:28:00.362000 audit[6450]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2340 pid=6450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:28:00.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666303731653761303638383764386533346133666233333662663066 Jul 12 00:28:00.362000 audit: BPF prog-id=244 op=UNLOAD Jul 12 00:28:00.362000 audit: BPF prog-id=243 op=UNLOAD Jul 12 00:28:00.362000 audit[6450]: AVC avc: denied { bpf } for pid=6450 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.362000 audit[6450]: AVC avc: denied { bpf } for pid=6450 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.362000 audit[6450]: AVC avc: denied { bpf } for pid=6450 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.362000 audit[6450]: AVC avc: denied { perfmon } for pid=6450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.362000 audit[6450]: AVC avc: denied { perfmon } for pid=6450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.362000 audit[6450]: AVC avc: denied { perfmon } for pid=6450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.362000 audit[6450]: AVC avc: denied { perfmon } for pid=6450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.362000 audit[6450]: AVC avc: denied { perfmon } for pid=6450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.362000 audit[6450]: AVC avc: denied { bpf } for pid=6450 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.362000 audit[6450]: AVC avc: denied { bpf } for pid=6450 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 12 00:28:00.362000 audit: BPF prog-id=245 op=LOAD Jul 12 00:28:00.362000 audit[6450]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2340 pid=6450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 12 00:28:00.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666303731653761303638383764386533346133666233333662663066 Jul 12 00:28:00.473000 audit[6369]: AVC avc: denied { watch } for pid=6369 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=7348 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:28:00.473000 audit[6369]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=4000055620 a2=fc6 a3=0 items=0 ppid=2324 pid=6369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c411 key=(null) Jul 12 00:28:00.473000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 12 00:28:00.475000 audit[6369]: AVC avc: denied { watch } for pid=6369 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7344 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:28:00.475000 audit[6369]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=4000053d00 a2=fc6 a3=0 items=0 ppid=2324 pid=6369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c411 key=(null) Jul 12 00:28:00.475000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 12 00:28:00.527833 env[1733]: time="2025-07-12T00:28:00.527729666Z" level=info msg="StartContainer for \"6f071e7a06887d8e34a3fb336bf0f5d5be3bf68a33d8026282dec0c550d05998\" returns successfully" Jul 12 00:28:03.191775 kubelet[2742]: E0712 00:28:03.191711 2742 controller.go:195] "Failed to update lease" err="Put \"https://172.31.26.167:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-26-167?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Jul 12 00:28:07.894207 systemd[1]: cri-containerd-0b4f904caa5392760706f30c012465f71d66518ac9a56aa49b94645ad75b6e14.scope: Deactivated successfully. Jul 12 00:28:07.893000 audit: BPF prog-id=238 op=UNLOAD Jul 12 00:28:07.896863 kernel: kauditd_printk_skb: 53 callbacks suppressed Jul 12 00:28:07.896988 kernel: audit: type=1334 audit(1752280087.893:1733): prog-id=238 op=UNLOAD Jul 12 00:28:07.898000 audit: BPF prog-id=241 op=UNLOAD Jul 12 00:28:07.903426 kernel: audit: type=1334 audit(1752280087.898:1734): prog-id=241 op=UNLOAD Jul 12 00:28:07.935997 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-0b4f904caa5392760706f30c012465f71d66518ac9a56aa49b94645ad75b6e14-rootfs.mount: Deactivated successfully. Jul 12 00:28:07.969371 env[1733]: time="2025-07-12T00:28:07.969287411Z" level=info msg="shim disconnected" id=0b4f904caa5392760706f30c012465f71d66518ac9a56aa49b94645ad75b6e14 Jul 12 00:28:07.969371 env[1733]: time="2025-07-12T00:28:07.969357590Z" level=warning msg="cleaning up after shim disconnected" id=0b4f904caa5392760706f30c012465f71d66518ac9a56aa49b94645ad75b6e14 namespace=k8s.io Jul 12 00:28:07.970192 env[1733]: time="2025-07-12T00:28:07.969382432Z" level=info msg="cleaning up dead shim" Jul 12 00:28:07.984670 env[1733]: time="2025-07-12T00:28:07.984593725Z" level=warning msg="cleanup warnings time=\"2025-07-12T00:28:07Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6521 runtime=io.containerd.runc.v2\n" Jul 12 00:28:08.154188 kubelet[2742]: I0712 00:28:08.153340 2742 scope.go:117] "RemoveContainer" containerID="909dbde8e0812e0f7e5737bb421c525c3b1081ed59a1760ea97c8595dd6ecb2a" Jul 12 00:28:08.154974 kubelet[2742]: I0712 00:28:08.154239 2742 scope.go:117] "RemoveContainer" containerID="0b4f904caa5392760706f30c012465f71d66518ac9a56aa49b94645ad75b6e14" Jul 12 00:28:08.157528 kubelet[2742]: E0712 00:28:08.157442 2742 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"tigera-operator\" with CrashLoopBackOff: \"back-off 10s restarting failed container=tigera-operator pod=tigera-operator-5bf8dfcb4-t2sd6_tigera-operator(cd775079-a3f4-48bc-97b0-2e493125feb4)\"" pod="tigera-operator/tigera-operator-5bf8dfcb4-t2sd6" podUID="cd775079-a3f4-48bc-97b0-2e493125feb4" Jul 12 00:28:08.158079 env[1733]: time="2025-07-12T00:28:08.158028640Z" level=info msg="RemoveContainer for \"909dbde8e0812e0f7e5737bb421c525c3b1081ed59a1760ea97c8595dd6ecb2a\"" Jul 12 00:28:08.165642 env[1733]: time="2025-07-12T00:28:08.165586549Z" level=info msg="RemoveContainer for \"909dbde8e0812e0f7e5737bb421c525c3b1081ed59a1760ea97c8595dd6ecb2a\" returns successfully" Jul 12 00:28:08.353325 update_engine[1727]: I0712 00:28:08.353011 1727 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Jul 12 00:28:08.354289 update_engine[1727]: I0712 00:28:08.353976 1727 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Jul 12 00:28:08.354289 update_engine[1727]: I0712 00:28:08.354242 1727 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Jul 12 00:28:08.354935 update_engine[1727]: E0712 00:28:08.354777 1727 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Jul 12 00:28:08.354935 update_engine[1727]: I0712 00:28:08.354902 1727 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Jul 12 00:28:13.193261 kubelet[2742]: E0712 00:28:13.193179 2742 controller.go:195] "Failed to update lease" err="Put \"https://172.31.26.167:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-26-167?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Jul 12 00:28:15.094000 audit[2517]: AVC avc: denied { watch } for pid=2517 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=7348 scontext=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:28:15.094000 audit[2517]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=1c a1=400a06a7e0 a2=fc6 a3=0 items=0 ppid=2367 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 key=(null) Jul 12 00:28:15.118394 kernel: audit: type=1400 audit(1752280095.094:1735): avc: denied { watch } for pid=2517 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=7348 scontext=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:28:15.118516 kernel: audit: type=1300 audit(1752280095.094:1735): arch=c00000b7 syscall=27 success=no exit=-13 a0=1c a1=400a06a7e0 a2=fc6 a3=0 items=0 ppid=2367 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 key=(null) Jul 12 00:28:15.094000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 12 00:28:15.129271 kernel: audit: type=1327 audit(1752280095.094:1735): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 12 00:28:15.099000 audit[2517]: AVC avc: denied { watch } for pid=2517 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=7346 scontext=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:28:15.139818 kernel: audit: type=1400 audit(1752280095.099:1736): avc: denied { watch } for pid=2517 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=7346 scontext=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:28:15.099000 audit[2517]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=1c a1=40129183c0 a2=fc6 a3=0 items=0 ppid=2367 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 key=(null) Jul 12 00:28:15.152710 kernel: audit: type=1300 audit(1752280095.099:1736): arch=c00000b7 syscall=27 success=no exit=-13 a0=1c a1=40129183c0 a2=fc6 a3=0 items=0 ppid=2367 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 key=(null) Jul 12 00:28:15.099000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 12 00:28:15.164133 kernel: audit: type=1327 audit(1752280095.099:1736): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 12 00:28:15.164221 kernel: audit: type=1400 audit(1752280095.102:1737): avc: denied { watch } for pid=2517 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=7350 scontext=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:28:15.102000 audit[2517]: AVC avc: denied { watch } for pid=2517 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=7350 scontext=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:28:15.102000 audit[2517]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=1c a1=40129185d0 a2=fc6 a3=0 items=0 ppid=2367 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 key=(null) Jul 12 00:28:15.187352 kernel: audit: type=1300 audit(1752280095.102:1737): arch=c00000b7 syscall=27 success=no exit=-13 a0=1c a1=40129185d0 a2=fc6 a3=0 items=0 ppid=2367 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 key=(null) Jul 12 00:28:15.187591 kernel: audit: type=1327 audit(1752280095.102:1737): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 12 00:28:15.102000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 12 00:28:15.117000 audit[2517]: AVC avc: denied { watch } for pid=2517 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7344 scontext=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:28:15.208182 kernel: audit: type=1400 audit(1752280095.117:1738): avc: denied { watch } for pid=2517 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7344 scontext=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:28:15.117000 audit[2517]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=1c a1=4011b656c0 a2=fc6 a3=0 items=0 ppid=2367 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 key=(null) Jul 12 00:28:15.117000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 12 00:28:15.133000 audit[2517]: AVC avc: denied { watch } for pid=2517 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7344 scontext=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:28:15.133000 audit[2517]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=1c a1=4011b65740 a2=fc6 a3=0 items=0 ppid=2367 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 key=(null) Jul 12 00:28:15.133000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Jul 12 00:28:15.133000 audit[2517]: AVC avc: denied { watch } for pid=2517 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=7348 scontext=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 12 00:28:15.133000 audit[2517]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=1c a1=40129187b0 a2=fc6 a3=0 items=0 ppid=2367 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c664,c704 key=(null) Jul 12 00:28:15.133000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75