Sep 13 00:46:15.019443 kernel: Linux version 5.15.192-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Sep 12 23:13:49 -00 2025 Sep 13 00:46:15.020651 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=65d14b740db9e581daa1d0206188b16d2f1a39e5c5e0878b6855323cd7c584ec Sep 13 00:46:15.020681 kernel: BIOS-provided physical RAM map: Sep 13 00:46:15.020694 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Sep 13 00:46:15.020705 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000786cdfff] usable Sep 13 00:46:15.020717 kernel: BIOS-e820: [mem 0x00000000786ce000-0x000000007894dfff] reserved Sep 13 00:46:15.020731 kernel: BIOS-e820: [mem 0x000000007894e000-0x000000007895dfff] ACPI data Sep 13 00:46:15.020743 kernel: BIOS-e820: [mem 0x000000007895e000-0x00000000789ddfff] ACPI NVS Sep 13 00:46:15.020758 kernel: BIOS-e820: [mem 0x00000000789de000-0x000000007c97bfff] usable Sep 13 00:46:15.020770 kernel: BIOS-e820: [mem 0x000000007c97c000-0x000000007c9fffff] reserved Sep 13 00:46:15.020781 kernel: NX (Execute Disable) protection: active Sep 13 00:46:15.020793 kernel: e820: update [mem 0x76813018-0x7681be57] usable ==> usable Sep 13 00:46:15.020806 kernel: e820: update [mem 0x76813018-0x7681be57] usable ==> usable Sep 13 00:46:15.020817 kernel: extended physical RAM map: Sep 13 00:46:15.020835 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable Sep 13 00:46:15.020848 kernel: reserve setup_data: [mem 0x0000000000100000-0x0000000076813017] usable Sep 13 00:46:15.020860 kernel: reserve setup_data: [mem 0x0000000076813018-0x000000007681be57] usable Sep 13 00:46:15.020872 kernel: reserve setup_data: [mem 0x000000007681be58-0x00000000786cdfff] usable Sep 13 00:46:15.020884 kernel: reserve setup_data: [mem 0x00000000786ce000-0x000000007894dfff] reserved Sep 13 00:46:15.020897 kernel: reserve setup_data: [mem 0x000000007894e000-0x000000007895dfff] ACPI data Sep 13 00:46:15.020910 kernel: reserve setup_data: [mem 0x000000007895e000-0x00000000789ddfff] ACPI NVS Sep 13 00:46:15.020923 kernel: reserve setup_data: [mem 0x00000000789de000-0x000000007c97bfff] usable Sep 13 00:46:15.020935 kernel: reserve setup_data: [mem 0x000000007c97c000-0x000000007c9fffff] reserved Sep 13 00:46:15.020948 kernel: efi: EFI v2.70 by EDK II Sep 13 00:46:15.020963 kernel: efi: SMBIOS=0x7886a000 ACPI=0x7895d000 ACPI 2.0=0x7895d014 MEMATTR=0x77004a98 Sep 13 00:46:15.020976 kernel: SMBIOS 2.7 present. Sep 13 00:46:15.020989 kernel: DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017 Sep 13 00:46:15.021001 kernel: Hypervisor detected: KVM Sep 13 00:46:15.021014 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Sep 13 00:46:15.021026 kernel: kvm-clock: cpu 0, msr 4f19f001, primary cpu clock Sep 13 00:46:15.021039 kernel: kvm-clock: using sched offset of 4218141427 cycles Sep 13 00:46:15.021053 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Sep 13 00:46:15.021066 kernel: tsc: Detected 2499.998 MHz processor Sep 13 00:46:15.021079 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Sep 13 00:46:15.021092 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Sep 13 00:46:15.021107 kernel: last_pfn = 0x7c97c max_arch_pfn = 0x400000000 Sep 13 00:46:15.021121 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Sep 13 00:46:15.021134 kernel: Using GB pages for direct mapping Sep 13 00:46:15.021147 kernel: Secure boot disabled Sep 13 00:46:15.021161 kernel: ACPI: Early table checksum verification disabled Sep 13 00:46:15.021180 kernel: ACPI: RSDP 0x000000007895D014 000024 (v02 AMAZON) Sep 13 00:46:15.021194 kernel: ACPI: XSDT 0x000000007895C0E8 00006C (v01 AMAZON AMZNFACP 00000001 01000013) Sep 13 00:46:15.021211 kernel: ACPI: FACP 0x0000000078955000 000114 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001) Sep 13 00:46:15.021224 kernel: ACPI: DSDT 0x0000000078956000 00115A (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001) Sep 13 00:46:15.021238 kernel: ACPI: FACS 0x00000000789D0000 000040 Sep 13 00:46:15.021253 kernel: ACPI: WAET 0x000000007895B000 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001) Sep 13 00:46:15.021267 kernel: ACPI: SLIT 0x000000007895A000 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Sep 13 00:46:15.021281 kernel: ACPI: APIC 0x0000000078959000 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001) Sep 13 00:46:15.021295 kernel: ACPI: SRAT 0x0000000078958000 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001) Sep 13 00:46:15.021312 kernel: ACPI: HPET 0x0000000078954000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001) Sep 13 00:46:15.021326 kernel: ACPI: SSDT 0x0000000078953000 000759 (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Sep 13 00:46:15.021340 kernel: ACPI: SSDT 0x0000000078952000 00007F (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Sep 13 00:46:15.021354 kernel: ACPI: BGRT 0x0000000078951000 000038 (v01 AMAZON AMAZON 00000002 01000013) Sep 13 00:46:15.021368 kernel: ACPI: Reserving FACP table memory at [mem 0x78955000-0x78955113] Sep 13 00:46:15.021382 kernel: ACPI: Reserving DSDT table memory at [mem 0x78956000-0x78957159] Sep 13 00:46:15.021396 kernel: ACPI: Reserving FACS table memory at [mem 0x789d0000-0x789d003f] Sep 13 00:46:15.021410 kernel: ACPI: Reserving WAET table memory at [mem 0x7895b000-0x7895b027] Sep 13 00:46:15.021424 kernel: ACPI: Reserving SLIT table memory at [mem 0x7895a000-0x7895a06b] Sep 13 00:46:15.021441 kernel: ACPI: Reserving APIC table memory at [mem 0x78959000-0x78959075] Sep 13 00:46:15.021455 kernel: ACPI: Reserving SRAT table memory at [mem 0x78958000-0x7895809f] Sep 13 00:46:15.021469 kernel: ACPI: Reserving HPET table memory at [mem 0x78954000-0x78954037] Sep 13 00:46:15.023521 kernel: ACPI: Reserving SSDT table memory at [mem 0x78953000-0x78953758] Sep 13 00:46:15.023555 kernel: ACPI: Reserving SSDT table memory at [mem 0x78952000-0x7895207e] Sep 13 00:46:15.023569 kernel: ACPI: Reserving BGRT table memory at [mem 0x78951000-0x78951037] Sep 13 00:46:15.023584 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Sep 13 00:46:15.023596 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Sep 13 00:46:15.023615 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff] Sep 13 00:46:15.023635 kernel: NUMA: Initialized distance table, cnt=1 Sep 13 00:46:15.023648 kernel: NODE_DATA(0) allocated [mem 0x7a8ef000-0x7a8f4fff] Sep 13 00:46:15.023663 kernel: Zone ranges: Sep 13 00:46:15.023677 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Sep 13 00:46:15.023696 kernel: DMA32 [mem 0x0000000001000000-0x000000007c97bfff] Sep 13 00:46:15.023710 kernel: Normal empty Sep 13 00:46:15.023724 kernel: Movable zone start for each node Sep 13 00:46:15.023738 kernel: Early memory node ranges Sep 13 00:46:15.023751 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Sep 13 00:46:15.023773 kernel: node 0: [mem 0x0000000000100000-0x00000000786cdfff] Sep 13 00:46:15.023787 kernel: node 0: [mem 0x00000000789de000-0x000000007c97bfff] Sep 13 00:46:15.023800 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007c97bfff] Sep 13 00:46:15.023814 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Sep 13 00:46:15.023832 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Sep 13 00:46:15.023847 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges Sep 13 00:46:15.023879 kernel: On node 0, zone DMA32: 13956 pages in unavailable ranges Sep 13 00:46:15.023898 kernel: ACPI: PM-Timer IO Port: 0xb008 Sep 13 00:46:15.023913 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Sep 13 00:46:15.023929 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 Sep 13 00:46:15.023943 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Sep 13 00:46:15.023957 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Sep 13 00:46:15.023970 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Sep 13 00:46:15.023985 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Sep 13 00:46:15.023999 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Sep 13 00:46:15.024013 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Sep 13 00:46:15.024026 kernel: TSC deadline timer available Sep 13 00:46:15.024040 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Sep 13 00:46:15.024056 kernel: [mem 0x7ca00000-0xffffffff] available for PCI devices Sep 13 00:46:15.024069 kernel: Booting paravirtualized kernel on KVM Sep 13 00:46:15.024083 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Sep 13 00:46:15.024103 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Sep 13 00:46:15.024118 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Sep 13 00:46:15.024132 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Sep 13 00:46:15.024146 kernel: pcpu-alloc: [0] 0 1 Sep 13 00:46:15.024161 kernel: kvm-guest: stealtime: cpu 0, msr 7a41c0c0 Sep 13 00:46:15.024174 kernel: kvm-guest: PV spinlocks enabled Sep 13 00:46:15.024192 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Sep 13 00:46:15.024205 kernel: Built 1 zonelists, mobility grouping on. Total pages: 501318 Sep 13 00:46:15.024219 kernel: Policy zone: DMA32 Sep 13 00:46:15.024234 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=65d14b740db9e581daa1d0206188b16d2f1a39e5c5e0878b6855323cd7c584ec Sep 13 00:46:15.024253 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Sep 13 00:46:15.024268 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Sep 13 00:46:15.024282 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Sep 13 00:46:15.024296 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Sep 13 00:46:15.024313 kernel: Memory: 1876640K/2037804K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47492K init, 4088K bss, 160904K reserved, 0K cma-reserved) Sep 13 00:46:15.024328 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Sep 13 00:46:15.024342 kernel: Kernel/User page tables isolation: enabled Sep 13 00:46:15.024355 kernel: ftrace: allocating 34614 entries in 136 pages Sep 13 00:46:15.024368 kernel: ftrace: allocated 136 pages with 2 groups Sep 13 00:46:15.024382 kernel: rcu: Hierarchical RCU implementation. Sep 13 00:46:15.024401 kernel: rcu: RCU event tracing is enabled. Sep 13 00:46:15.024429 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Sep 13 00:46:15.024445 kernel: Rude variant of Tasks RCU enabled. Sep 13 00:46:15.024459 kernel: Tracing variant of Tasks RCU enabled. Sep 13 00:46:15.024473 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Sep 13 00:46:15.024499 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Sep 13 00:46:15.024517 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Sep 13 00:46:15.024532 kernel: random: crng init done Sep 13 00:46:15.024546 kernel: Console: colour dummy device 80x25 Sep 13 00:46:15.024561 kernel: printk: console [tty0] enabled Sep 13 00:46:15.024576 kernel: printk: console [ttyS0] enabled Sep 13 00:46:15.024591 kernel: ACPI: Core revision 20210730 Sep 13 00:46:15.024611 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns Sep 13 00:46:15.024630 kernel: APIC: Switch to symmetric I/O mode setup Sep 13 00:46:15.024644 kernel: x2apic enabled Sep 13 00:46:15.024659 kernel: Switched APIC routing to physical x2apic. Sep 13 00:46:15.024675 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns Sep 13 00:46:15.024690 kernel: Calibrating delay loop (skipped) preset value.. 4999.99 BogoMIPS (lpj=2499998) Sep 13 00:46:15.024704 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Sep 13 00:46:15.024723 kernel: Last level dTLB entries: 4KB 64, 2MB 32, 4MB 32, 1GB 4 Sep 13 00:46:15.024741 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Sep 13 00:46:15.024755 kernel: Spectre V2 : Mitigation: Retpolines Sep 13 00:46:15.024770 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Sep 13 00:46:15.024784 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Sep 13 00:46:15.024799 kernel: RETBleed: Vulnerable Sep 13 00:46:15.024813 kernel: Speculative Store Bypass: Vulnerable Sep 13 00:46:15.024831 kernel: MDS: Vulnerable: Clear CPU buffers attempted, no microcode Sep 13 00:46:15.024846 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Sep 13 00:46:15.024861 kernel: GDS: Unknown: Dependent on hypervisor status Sep 13 00:46:15.024875 kernel: active return thunk: its_return_thunk Sep 13 00:46:15.024889 kernel: ITS: Mitigation: Aligned branch/return thunks Sep 13 00:46:15.024906 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Sep 13 00:46:15.024926 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Sep 13 00:46:15.024941 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Sep 13 00:46:15.024955 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Sep 13 00:46:15.024974 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Sep 13 00:46:15.024989 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Sep 13 00:46:15.025002 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Sep 13 00:46:15.025017 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Sep 13 00:46:15.025035 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' Sep 13 00:46:15.025051 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Sep 13 00:46:15.025066 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Sep 13 00:46:15.025082 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Sep 13 00:46:15.025102 kernel: x86/fpu: xstate_offset[5]: 960, xstate_sizes[5]: 64 Sep 13 00:46:15.025116 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]: 512 Sep 13 00:46:15.025130 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024 Sep 13 00:46:15.025148 kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]: 8 Sep 13 00:46:15.025164 kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format. Sep 13 00:46:15.025179 kernel: Freeing SMP alternatives memory: 32K Sep 13 00:46:15.025193 kernel: pid_max: default: 32768 minimum: 301 Sep 13 00:46:15.025212 kernel: LSM: Security Framework initializing Sep 13 00:46:15.025227 kernel: SELinux: Initializing. Sep 13 00:46:15.025241 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Sep 13 00:46:15.025263 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Sep 13 00:46:15.025278 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x7) Sep 13 00:46:15.025293 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Sep 13 00:46:15.025313 kernel: signal: max sigframe size: 3632 Sep 13 00:46:15.025328 kernel: rcu: Hierarchical SRCU implementation. Sep 13 00:46:15.025343 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Sep 13 00:46:15.025358 kernel: smp: Bringing up secondary CPUs ... Sep 13 00:46:15.025372 kernel: x86: Booting SMP configuration: Sep 13 00:46:15.025392 kernel: .... node #0, CPUs: #1 Sep 13 00:46:15.025407 kernel: kvm-clock: cpu 1, msr 4f19f041, secondary cpu clock Sep 13 00:46:15.025425 kernel: kvm-guest: stealtime: cpu 1, msr 7a51c0c0 Sep 13 00:46:15.025441 kernel: Transient Scheduler Attacks: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Sep 13 00:46:15.025456 kernel: Transient Scheduler Attacks: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Sep 13 00:46:15.025476 kernel: smp: Brought up 1 node, 2 CPUs Sep 13 00:46:15.025501 kernel: smpboot: Max logical packages: 1 Sep 13 00:46:15.025515 kernel: smpboot: Total of 2 processors activated (9999.99 BogoMIPS) Sep 13 00:46:15.025535 kernel: devtmpfs: initialized Sep 13 00:46:15.025550 kernel: x86/mm: Memory block size: 128MB Sep 13 00:46:15.025568 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x7895e000-0x789ddfff] (524288 bytes) Sep 13 00:46:15.025583 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Sep 13 00:46:15.025598 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Sep 13 00:46:15.025617 kernel: pinctrl core: initialized pinctrl subsystem Sep 13 00:46:15.025632 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Sep 13 00:46:15.025647 kernel: audit: initializing netlink subsys (disabled) Sep 13 00:46:15.025662 kernel: audit: type=2000 audit(1757724374.785:1): state=initialized audit_enabled=0 res=1 Sep 13 00:46:15.025681 kernel: thermal_sys: Registered thermal governor 'step_wise' Sep 13 00:46:15.025696 kernel: thermal_sys: Registered thermal governor 'user_space' Sep 13 00:46:15.025714 kernel: cpuidle: using governor menu Sep 13 00:46:15.025733 kernel: ACPI: bus type PCI registered Sep 13 00:46:15.025749 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Sep 13 00:46:15.025763 kernel: dca service started, version 1.12.1 Sep 13 00:46:15.025783 kernel: PCI: Using configuration type 1 for base access Sep 13 00:46:15.025798 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Sep 13 00:46:15.025812 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Sep 13 00:46:15.025831 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Sep 13 00:46:15.025847 kernel: ACPI: Added _OSI(Module Device) Sep 13 00:46:15.025864 kernel: ACPI: Added _OSI(Processor Device) Sep 13 00:46:15.025879 kernel: ACPI: Added _OSI(Processor Aggregator Device) Sep 13 00:46:15.025893 kernel: ACPI: Added _OSI(Linux-Dell-Video) Sep 13 00:46:15.025908 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Sep 13 00:46:15.025923 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Sep 13 00:46:15.025938 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Sep 13 00:46:15.025953 kernel: ACPI: Interpreter enabled Sep 13 00:46:15.025968 kernel: ACPI: PM: (supports S0 S5) Sep 13 00:46:15.025983 kernel: ACPI: Using IOAPIC for interrupt routing Sep 13 00:46:15.026001 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Sep 13 00:46:15.026016 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Sep 13 00:46:15.026031 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Sep 13 00:46:15.026247 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Sep 13 00:46:15.026377 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Sep 13 00:46:15.026396 kernel: acpiphp: Slot [3] registered Sep 13 00:46:15.026411 kernel: acpiphp: Slot [4] registered Sep 13 00:46:15.026429 kernel: acpiphp: Slot [5] registered Sep 13 00:46:15.026443 kernel: acpiphp: Slot [6] registered Sep 13 00:46:15.026457 kernel: acpiphp: Slot [7] registered Sep 13 00:46:15.026472 kernel: acpiphp: Slot [8] registered Sep 13 00:46:15.049906 kernel: acpiphp: Slot [9] registered Sep 13 00:46:15.049931 kernel: acpiphp: Slot [10] registered Sep 13 00:46:15.049948 kernel: acpiphp: Slot [11] registered Sep 13 00:46:15.049964 kernel: acpiphp: Slot [12] registered Sep 13 00:46:15.049978 kernel: acpiphp: Slot [13] registered Sep 13 00:46:15.049993 kernel: acpiphp: Slot [14] registered Sep 13 00:46:15.050013 kernel: acpiphp: Slot [15] registered Sep 13 00:46:15.050026 kernel: acpiphp: Slot [16] registered Sep 13 00:46:15.050041 kernel: acpiphp: Slot [17] registered Sep 13 00:46:15.050054 kernel: acpiphp: Slot [18] registered Sep 13 00:46:15.050068 kernel: acpiphp: Slot [19] registered Sep 13 00:46:15.050083 kernel: acpiphp: Slot [20] registered Sep 13 00:46:15.050098 kernel: acpiphp: Slot [21] registered Sep 13 00:46:15.050112 kernel: acpiphp: Slot [22] registered Sep 13 00:46:15.050127 kernel: acpiphp: Slot [23] registered Sep 13 00:46:15.050145 kernel: acpiphp: Slot [24] registered Sep 13 00:46:15.050159 kernel: acpiphp: Slot [25] registered Sep 13 00:46:15.050176 kernel: acpiphp: Slot [26] registered Sep 13 00:46:15.050193 kernel: acpiphp: Slot [27] registered Sep 13 00:46:15.050208 kernel: acpiphp: Slot [28] registered Sep 13 00:46:15.050223 kernel: acpiphp: Slot [29] registered Sep 13 00:46:15.050236 kernel: acpiphp: Slot [30] registered Sep 13 00:46:15.050250 kernel: acpiphp: Slot [31] registered Sep 13 00:46:15.050263 kernel: PCI host bridge to bus 0000:00 Sep 13 00:46:15.050453 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Sep 13 00:46:15.052727 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Sep 13 00:46:15.052863 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Sep 13 00:46:15.052981 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Sep 13 00:46:15.053099 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x2000ffffffff window] Sep 13 00:46:15.053215 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Sep 13 00:46:15.053367 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Sep 13 00:46:15.053545 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Sep 13 00:46:15.053691 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x000000 Sep 13 00:46:15.053825 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Sep 13 00:46:15.053955 kernel: pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff Sep 13 00:46:15.054089 kernel: pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff Sep 13 00:46:15.054218 kernel: pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff Sep 13 00:46:15.054342 kernel: pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff Sep 13 00:46:15.054492 kernel: pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff Sep 13 00:46:15.054625 kernel: pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff Sep 13 00:46:15.054761 kernel: pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000 Sep 13 00:46:15.054892 kernel: pci 0000:00:03.0: reg 0x10: [mem 0x80000000-0x803fffff pref] Sep 13 00:46:15.055020 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] Sep 13 00:46:15.055148 kernel: pci 0000:00:03.0: BAR 0: assigned to efifb Sep 13 00:46:15.055276 kernel: pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Sep 13 00:46:15.055417 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Sep 13 00:46:15.055561 kernel: pci 0000:00:04.0: reg 0x10: [mem 0x80404000-0x80407fff] Sep 13 00:46:15.055702 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Sep 13 00:46:15.055833 kernel: pci 0000:00:05.0: reg 0x10: [mem 0x80400000-0x80403fff] Sep 13 00:46:15.055853 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Sep 13 00:46:15.055879 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Sep 13 00:46:15.055898 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Sep 13 00:46:15.055913 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Sep 13 00:46:15.055929 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Sep 13 00:46:15.055944 kernel: iommu: Default domain type: Translated Sep 13 00:46:15.055959 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Sep 13 00:46:15.056089 kernel: pci 0000:00:03.0: vgaarb: setting as boot VGA device Sep 13 00:46:15.056218 kernel: pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Sep 13 00:46:15.056347 kernel: pci 0000:00:03.0: vgaarb: bridge control possible Sep 13 00:46:15.056366 kernel: vgaarb: loaded Sep 13 00:46:15.056384 kernel: pps_core: LinuxPPS API ver. 1 registered Sep 13 00:46:15.056398 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Sep 13 00:46:15.056412 kernel: PTP clock support registered Sep 13 00:46:15.056427 kernel: Registered efivars operations Sep 13 00:46:15.056440 kernel: PCI: Using ACPI for IRQ routing Sep 13 00:46:15.056454 kernel: PCI: pci_cache_line_size set to 64 bytes Sep 13 00:46:15.056469 kernel: e820: reserve RAM buffer [mem 0x76813018-0x77ffffff] Sep 13 00:46:15.056495 kernel: e820: reserve RAM buffer [mem 0x786ce000-0x7bffffff] Sep 13 00:46:15.056510 kernel: e820: reserve RAM buffer [mem 0x7c97c000-0x7fffffff] Sep 13 00:46:15.056527 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Sep 13 00:46:15.056541 kernel: hpet0: 8 comparators, 32-bit 62.500000 MHz counter Sep 13 00:46:15.056555 kernel: clocksource: Switched to clocksource kvm-clock Sep 13 00:46:15.056570 kernel: VFS: Disk quotas dquot_6.6.0 Sep 13 00:46:15.056585 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Sep 13 00:46:15.056599 kernel: pnp: PnP ACPI init Sep 13 00:46:15.056613 kernel: pnp: PnP ACPI: found 5 devices Sep 13 00:46:15.056627 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Sep 13 00:46:15.056642 kernel: NET: Registered PF_INET protocol family Sep 13 00:46:15.056659 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Sep 13 00:46:15.056673 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Sep 13 00:46:15.056687 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Sep 13 00:46:15.056701 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Sep 13 00:46:15.056715 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Sep 13 00:46:15.056729 kernel: TCP: Hash tables configured (established 16384 bind 16384) Sep 13 00:46:15.056744 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Sep 13 00:46:15.056758 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Sep 13 00:46:15.056772 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Sep 13 00:46:15.056788 kernel: NET: Registered PF_XDP protocol family Sep 13 00:46:15.056911 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Sep 13 00:46:15.057021 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Sep 13 00:46:15.057127 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Sep 13 00:46:15.057231 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Sep 13 00:46:15.057338 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x2000ffffffff window] Sep 13 00:46:15.057459 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Sep 13 00:46:15.071073 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Sep 13 00:46:15.071124 kernel: PCI: CLS 0 bytes, default 64 Sep 13 00:46:15.071140 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Sep 13 00:46:15.071155 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns Sep 13 00:46:15.071169 kernel: clocksource: Switched to clocksource tsc Sep 13 00:46:15.071184 kernel: Initialise system trusted keyrings Sep 13 00:46:15.071199 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Sep 13 00:46:15.071215 kernel: Key type asymmetric registered Sep 13 00:46:15.071229 kernel: Asymmetric key parser 'x509' registered Sep 13 00:46:15.071248 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Sep 13 00:46:15.071263 kernel: io scheduler mq-deadline registered Sep 13 00:46:15.071278 kernel: io scheduler kyber registered Sep 13 00:46:15.071294 kernel: io scheduler bfq registered Sep 13 00:46:15.071309 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Sep 13 00:46:15.071324 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Sep 13 00:46:15.071338 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Sep 13 00:46:15.071352 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Sep 13 00:46:15.071365 kernel: i8042: Warning: Keylock active Sep 13 00:46:15.071383 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Sep 13 00:46:15.071396 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Sep 13 00:46:15.073297 kernel: rtc_cmos 00:00: RTC can wake from S4 Sep 13 00:46:15.073448 kernel: rtc_cmos 00:00: registered as rtc0 Sep 13 00:46:15.073597 kernel: rtc_cmos 00:00: setting system clock to 2025-09-13T00:46:14 UTC (1757724374) Sep 13 00:46:15.073719 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Sep 13 00:46:15.073739 kernel: intel_pstate: CPU model not supported Sep 13 00:46:15.073755 kernel: efifb: probing for efifb Sep 13 00:46:15.073776 kernel: efifb: framebuffer at 0x80000000, using 1876k, total 1875k Sep 13 00:46:15.073790 kernel: efifb: mode is 800x600x32, linelength=3200, pages=1 Sep 13 00:46:15.073805 kernel: efifb: scrolling: redraw Sep 13 00:46:15.073820 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Sep 13 00:46:15.073835 kernel: Console: switching to colour frame buffer device 100x37 Sep 13 00:46:15.073851 kernel: fb0: EFI VGA frame buffer device Sep 13 00:46:15.073890 kernel: pstore: Registered efi as persistent store backend Sep 13 00:46:15.073908 kernel: NET: Registered PF_INET6 protocol family Sep 13 00:46:15.073923 kernel: Segment Routing with IPv6 Sep 13 00:46:15.073941 kernel: In-situ OAM (IOAM) with IPv6 Sep 13 00:46:15.073957 kernel: NET: Registered PF_PACKET protocol family Sep 13 00:46:15.073973 kernel: Key type dns_resolver registered Sep 13 00:46:15.073989 kernel: IPI shorthand broadcast: enabled Sep 13 00:46:15.074004 kernel: sched_clock: Marking stable (365202037, 141962080)->(595332431, -88168314) Sep 13 00:46:15.074020 kernel: registered taskstats version 1 Sep 13 00:46:15.074036 kernel: Loading compiled-in X.509 certificates Sep 13 00:46:15.074051 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.192-flatcar: d4931373bb0d9b9f95da11f02ae07d3649cc6c37' Sep 13 00:46:15.074067 kernel: Key type .fscrypt registered Sep 13 00:46:15.074085 kernel: Key type fscrypt-provisioning registered Sep 13 00:46:15.074101 kernel: pstore: Using crash dump compression: deflate Sep 13 00:46:15.074116 kernel: ima: No TPM chip found, activating TPM-bypass! Sep 13 00:46:15.074131 kernel: ima: Allocated hash algorithm: sha1 Sep 13 00:46:15.074150 kernel: ima: No architecture policies found Sep 13 00:46:15.074165 kernel: clk: Disabling unused clocks Sep 13 00:46:15.074181 kernel: Freeing unused kernel image (initmem) memory: 47492K Sep 13 00:46:15.074198 kernel: Write protecting the kernel read-only data: 28672k Sep 13 00:46:15.074213 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Sep 13 00:46:15.074232 kernel: Freeing unused kernel image (rodata/data gap) memory: 604K Sep 13 00:46:15.074248 kernel: Run /init as init process Sep 13 00:46:15.074263 kernel: with arguments: Sep 13 00:46:15.074279 kernel: /init Sep 13 00:46:15.074294 kernel: with environment: Sep 13 00:46:15.074310 kernel: HOME=/ Sep 13 00:46:15.074325 kernel: TERM=linux Sep 13 00:46:15.074341 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Sep 13 00:46:15.074361 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 13 00:46:15.074383 systemd[1]: Detected virtualization amazon. Sep 13 00:46:15.074400 systemd[1]: Detected architecture x86-64. Sep 13 00:46:15.074417 systemd[1]: Running in initrd. Sep 13 00:46:15.074433 systemd[1]: No hostname configured, using default hostname. Sep 13 00:46:15.074450 systemd[1]: Hostname set to . Sep 13 00:46:15.074467 systemd[1]: Initializing machine ID from VM UUID. Sep 13 00:46:15.074507 systemd[1]: Queued start job for default target initrd.target. Sep 13 00:46:15.074527 systemd[1]: Started systemd-ask-password-console.path. Sep 13 00:46:15.074543 systemd[1]: Reached target cryptsetup.target. Sep 13 00:46:15.074559 systemd[1]: Reached target paths.target. Sep 13 00:46:15.074575 systemd[1]: Reached target slices.target. Sep 13 00:46:15.074592 systemd[1]: Reached target swap.target. Sep 13 00:46:15.074611 systemd[1]: Reached target timers.target. Sep 13 00:46:15.074628 systemd[1]: Listening on iscsid.socket. Sep 13 00:46:15.074644 systemd[1]: Listening on iscsiuio.socket. Sep 13 00:46:15.074661 systemd[1]: Listening on systemd-journald-audit.socket. Sep 13 00:46:15.074677 systemd[1]: Listening on systemd-journald-dev-log.socket. Sep 13 00:46:15.074694 systemd[1]: Listening on systemd-journald.socket. Sep 13 00:46:15.074710 systemd[1]: Listening on systemd-networkd.socket. Sep 13 00:46:15.074727 systemd[1]: Listening on systemd-udevd-control.socket. Sep 13 00:46:15.074748 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 13 00:46:15.074764 systemd[1]: Reached target sockets.target. Sep 13 00:46:15.074781 systemd[1]: Starting kmod-static-nodes.service... Sep 13 00:46:15.074796 systemd[1]: Finished network-cleanup.service. Sep 13 00:46:15.074813 systemd[1]: Starting systemd-fsck-usr.service... Sep 13 00:46:15.074829 systemd[1]: Starting systemd-journald.service... Sep 13 00:46:15.074846 systemd[1]: Starting systemd-modules-load.service... Sep 13 00:46:15.074862 systemd[1]: Starting systemd-resolved.service... Sep 13 00:46:15.074878 systemd[1]: Starting systemd-vconsole-setup.service... Sep 13 00:46:15.074897 systemd[1]: Finished kmod-static-nodes.service. Sep 13 00:46:15.074914 systemd[1]: Finished systemd-fsck-usr.service. Sep 13 00:46:15.074931 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Sep 13 00:46:15.074946 systemd[1]: Finished systemd-vconsole-setup.service. Sep 13 00:46:15.074963 kernel: audit: type=1130 audit(1757724375.011:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:15.074979 systemd[1]: Starting dracut-cmdline-ask.service... Sep 13 00:46:15.074996 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Sep 13 00:46:15.075012 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Sep 13 00:46:15.075032 kernel: audit: type=1130 audit(1757724375.060:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:15.075048 systemd[1]: Started systemd-resolved.service. Sep 13 00:46:15.075077 systemd-journald[185]: Journal started Sep 13 00:46:15.075155 systemd-journald[185]: Runtime Journal (/run/log/journal/ec2feddcaa1b87e72865e738adc819dc) is 4.8M, max 38.3M, 33.5M free. Sep 13 00:46:15.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:15.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:15.021935 systemd-modules-load[186]: Inserted module 'overlay' Sep 13 00:46:15.087546 kernel: audit: type=1130 audit(1757724375.075:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:15.087580 systemd[1]: Started systemd-journald.service. Sep 13 00:46:15.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:15.044972 systemd-resolved[187]: Positive Trust Anchors: Sep 13 00:46:15.044983 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 13 00:46:15.106325 kernel: audit: type=1130 audit(1757724375.088:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:15.106363 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Sep 13 00:46:15.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:15.045039 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 13 00:46:15.128653 kernel: audit: type=1130 audit(1757724375.099:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:15.128689 kernel: Bridge firewalling registered Sep 13 00:46:15.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:15.049113 systemd-resolved[187]: Defaulting to hostname 'linux'. Sep 13 00:46:15.089354 systemd[1]: Finished dracut-cmdline-ask.service. Sep 13 00:46:15.099979 systemd[1]: Reached target nss-lookup.target. Sep 13 00:46:15.119258 systemd[1]: Starting dracut-cmdline.service... Sep 13 00:46:15.119944 systemd-modules-load[186]: Inserted module 'br_netfilter' Sep 13 00:46:15.140668 dracut-cmdline[201]: dracut-dracut-053 Sep 13 00:46:15.144914 dracut-cmdline[201]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=65d14b740db9e581daa1d0206188b16d2f1a39e5c5e0878b6855323cd7c584ec Sep 13 00:46:15.155111 kernel: SCSI subsystem initialized Sep 13 00:46:15.174369 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Sep 13 00:46:15.174438 kernel: device-mapper: uevent: version 1.0.3 Sep 13 00:46:15.178502 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Sep 13 00:46:15.182718 systemd-modules-load[186]: Inserted module 'dm_multipath' Sep 13 00:46:15.183698 systemd[1]: Finished systemd-modules-load.service. Sep 13 00:46:15.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:15.186995 systemd[1]: Starting systemd-sysctl.service... Sep 13 00:46:15.196590 kernel: audit: type=1130 audit(1757724375.185:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:15.203312 systemd[1]: Finished systemd-sysctl.service. Sep 13 00:46:15.211683 kernel: audit: type=1130 audit(1757724375.203:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:15.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:15.241507 kernel: Loading iSCSI transport class v2.0-870. Sep 13 00:46:15.260510 kernel: iscsi: registered transport (tcp) Sep 13 00:46:15.285219 kernel: iscsi: registered transport (qla4xxx) Sep 13 00:46:15.285298 kernel: QLogic iSCSI HBA Driver Sep 13 00:46:15.316938 systemd[1]: Finished dracut-cmdline.service. Sep 13 00:46:15.317000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:15.318900 systemd[1]: Starting dracut-pre-udev.service... Sep 13 00:46:15.327590 kernel: audit: type=1130 audit(1757724375.317:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:15.372551 kernel: raid6: avx512x4 gen() 18339 MB/s Sep 13 00:46:15.390520 kernel: raid6: avx512x4 xor() 8232 MB/s Sep 13 00:46:15.408530 kernel: raid6: avx512x2 gen() 18477 MB/s Sep 13 00:46:15.426527 kernel: raid6: avx512x2 xor() 24256 MB/s Sep 13 00:46:15.444514 kernel: raid6: avx512x1 gen() 18572 MB/s Sep 13 00:46:15.462534 kernel: raid6: avx512x1 xor() 22179 MB/s Sep 13 00:46:15.480518 kernel: raid6: avx2x4 gen() 18398 MB/s Sep 13 00:46:15.498542 kernel: raid6: avx2x4 xor() 7352 MB/s Sep 13 00:46:15.516534 kernel: raid6: avx2x2 gen() 18382 MB/s Sep 13 00:46:15.534532 kernel: raid6: avx2x2 xor() 18188 MB/s Sep 13 00:46:15.552529 kernel: raid6: avx2x1 gen() 14156 MB/s Sep 13 00:46:15.570513 kernel: raid6: avx2x1 xor() 15750 MB/s Sep 13 00:46:15.588511 kernel: raid6: sse2x4 gen() 9533 MB/s Sep 13 00:46:15.606510 kernel: raid6: sse2x4 xor() 6114 MB/s Sep 13 00:46:15.624514 kernel: raid6: sse2x2 gen() 10536 MB/s Sep 13 00:46:15.642511 kernel: raid6: sse2x2 xor() 6119 MB/s Sep 13 00:46:15.660509 kernel: raid6: sse2x1 gen() 9461 MB/s Sep 13 00:46:15.678827 kernel: raid6: sse2x1 xor() 4811 MB/s Sep 13 00:46:15.678878 kernel: raid6: using algorithm avx512x1 gen() 18572 MB/s Sep 13 00:46:15.678897 kernel: raid6: .... xor() 22179 MB/s, rmw enabled Sep 13 00:46:15.679968 kernel: raid6: using avx512x2 recovery algorithm Sep 13 00:46:15.694512 kernel: xor: automatically using best checksumming function avx Sep 13 00:46:15.802605 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Sep 13 00:46:15.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:15.815500 systemd[1]: Finished dracut-pre-udev.service. Sep 13 00:46:15.821647 kernel: audit: type=1130 audit(1757724375.815:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:15.821000 audit: BPF prog-id=7 op=LOAD Sep 13 00:46:15.821000 audit: BPF prog-id=8 op=LOAD Sep 13 00:46:15.822407 systemd[1]: Starting systemd-udevd.service... Sep 13 00:46:15.835932 systemd-udevd[386]: Using default interface naming scheme 'v252'. Sep 13 00:46:15.841309 systemd[1]: Started systemd-udevd.service. Sep 13 00:46:15.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:15.843148 systemd[1]: Starting dracut-pre-trigger.service... Sep 13 00:46:15.861781 dracut-pre-trigger[392]: rd.md=0: removing MD RAID activation Sep 13 00:46:15.892662 systemd[1]: Finished dracut-pre-trigger.service. Sep 13 00:46:15.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:15.894178 systemd[1]: Starting systemd-udev-trigger.service... Sep 13 00:46:15.937885 systemd[1]: Finished systemd-udev-trigger.service. Sep 13 00:46:15.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:15.999513 kernel: cryptd: max_cpu_qlen set to 1000 Sep 13 00:46:16.004383 kernel: ena 0000:00:05.0: ENA device version: 0.10 Sep 13 00:46:16.022436 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Sep 13 00:46:16.022595 kernel: ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy. Sep 13 00:46:16.022690 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem 80400000, mac addr 06:d9:cc:20:83:4b Sep 13 00:46:16.023938 (udev-worker)[428]: Network interface NamePolicy= disabled on kernel command line. Sep 13 00:46:16.054629 kernel: AVX2 version of gcm_enc/dec engaged. Sep 13 00:46:16.054697 kernel: AES CTR mode by8 optimization enabled Sep 13 00:46:16.064701 kernel: nvme nvme0: pci function 0000:00:04.0 Sep 13 00:46:16.064967 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Sep 13 00:46:16.076664 kernel: nvme nvme0: 2/0/0 default/read/poll queues Sep 13 00:46:16.083508 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Sep 13 00:46:16.083572 kernel: GPT:9289727 != 16777215 Sep 13 00:46:16.083585 kernel: GPT:Alternate GPT header not at the end of the disk. Sep 13 00:46:16.084635 kernel: GPT:9289727 != 16777215 Sep 13 00:46:16.085663 kernel: GPT: Use GNU Parted to correct GPT errors. Sep 13 00:46:16.088113 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Sep 13 00:46:16.152505 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/nvme0n1p6 scanned by (udev-worker) (436) Sep 13 00:46:16.205261 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Sep 13 00:46:16.221132 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 13 00:46:16.232570 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Sep 13 00:46:16.233620 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Sep 13 00:46:16.243805 systemd[1]: Starting disk-uuid.service... Sep 13 00:46:16.251254 disk-uuid[591]: Primary Header is updated. Sep 13 00:46:16.251254 disk-uuid[591]: Secondary Entries is updated. Sep 13 00:46:16.251254 disk-uuid[591]: Secondary Header is updated. Sep 13 00:46:16.254520 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Sep 13 00:46:16.261512 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Sep 13 00:46:16.268505 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Sep 13 00:46:16.274512 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Sep 13 00:46:17.273427 disk-uuid[592]: The operation has completed successfully. Sep 13 00:46:17.274103 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Sep 13 00:46:17.411560 systemd[1]: disk-uuid.service: Deactivated successfully. Sep 13 00:46:17.411699 systemd[1]: Finished disk-uuid.service. Sep 13 00:46:17.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:17.411000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:17.421544 systemd[1]: Starting verity-setup.service... Sep 13 00:46:17.447512 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Sep 13 00:46:17.543046 systemd[1]: Found device dev-mapper-usr.device. Sep 13 00:46:17.545918 systemd[1]: Mounting sysusr-usr.mount... Sep 13 00:46:17.547356 systemd[1]: Finished verity-setup.service. Sep 13 00:46:17.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:17.633979 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Sep 13 00:46:17.634455 systemd[1]: Mounted sysusr-usr.mount. Sep 13 00:46:17.635280 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Sep 13 00:46:17.636497 systemd[1]: Starting ignition-setup.service... Sep 13 00:46:17.641625 systemd[1]: Starting parse-ip-for-networkd.service... Sep 13 00:46:17.660905 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Sep 13 00:46:17.660974 kernel: BTRFS info (device nvme0n1p6): using free space tree Sep 13 00:46:17.661000 kernel: BTRFS info (device nvme0n1p6): has skinny extents Sep 13 00:46:17.701513 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Sep 13 00:46:17.715330 systemd[1]: mnt-oem.mount: Deactivated successfully. Sep 13 00:46:17.725061 systemd[1]: Finished ignition-setup.service. Sep 13 00:46:17.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:17.727018 systemd[1]: Starting ignition-fetch-offline.service... Sep 13 00:46:17.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:17.731000 audit: BPF prog-id=9 op=LOAD Sep 13 00:46:17.730268 systemd[1]: Finished parse-ip-for-networkd.service. Sep 13 00:46:17.732313 systemd[1]: Starting systemd-networkd.service... Sep 13 00:46:17.756304 systemd-networkd[1103]: lo: Link UP Sep 13 00:46:17.756317 systemd-networkd[1103]: lo: Gained carrier Sep 13 00:46:17.756961 systemd-networkd[1103]: Enumeration completed Sep 13 00:46:17.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:17.757076 systemd[1]: Started systemd-networkd.service. Sep 13 00:46:17.757357 systemd-networkd[1103]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 13 00:46:17.759550 systemd[1]: Reached target network.target. Sep 13 00:46:17.761705 systemd-networkd[1103]: eth0: Link UP Sep 13 00:46:17.761711 systemd-networkd[1103]: eth0: Gained carrier Sep 13 00:46:17.762084 systemd[1]: Starting iscsiuio.service... Sep 13 00:46:17.769445 systemd[1]: Started iscsiuio.service. Sep 13 00:46:17.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:17.771175 systemd[1]: Starting iscsid.service... Sep 13 00:46:17.777514 iscsid[1108]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Sep 13 00:46:17.777514 iscsid[1108]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Sep 13 00:46:17.777514 iscsid[1108]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Sep 13 00:46:17.777514 iscsid[1108]: If using hardware iscsi like qla4xxx this message can be ignored. Sep 13 00:46:17.777514 iscsid[1108]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Sep 13 00:46:17.777514 iscsid[1108]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Sep 13 00:46:17.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:17.778323 systemd[1]: Started iscsid.service. Sep 13 00:46:17.779297 systemd-networkd[1103]: eth0: DHCPv4 address 172.31.26.227/20, gateway 172.31.16.1 acquired from 172.31.16.1 Sep 13 00:46:17.781683 systemd[1]: Starting dracut-initqueue.service... Sep 13 00:46:17.798058 systemd[1]: Finished dracut-initqueue.service. Sep 13 00:46:17.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:17.799266 systemd[1]: Reached target remote-fs-pre.target. Sep 13 00:46:17.800529 systemd[1]: Reached target remote-cryptsetup.target. Sep 13 00:46:17.801683 systemd[1]: Reached target remote-fs.target. Sep 13 00:46:17.804068 systemd[1]: Starting dracut-pre-mount.service... Sep 13 00:46:17.813898 systemd[1]: Finished dracut-pre-mount.service. Sep 13 00:46:17.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:18.333533 ignition[1102]: Ignition 2.14.0 Sep 13 00:46:18.333547 ignition[1102]: Stage: fetch-offline Sep 13 00:46:18.333678 ignition[1102]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:46:18.333711 ignition[1102]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Sep 13 00:46:18.346462 ignition[1102]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Sep 13 00:46:18.347215 ignition[1102]: Ignition finished successfully Sep 13 00:46:18.348944 systemd[1]: Finished ignition-fetch-offline.service. Sep 13 00:46:18.349000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:18.350931 systemd[1]: Starting ignition-fetch.service... Sep 13 00:46:18.360870 ignition[1127]: Ignition 2.14.0 Sep 13 00:46:18.360883 ignition[1127]: Stage: fetch Sep 13 00:46:18.361081 ignition[1127]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:46:18.361112 ignition[1127]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Sep 13 00:46:18.368196 ignition[1127]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Sep 13 00:46:18.369127 ignition[1127]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Sep 13 00:46:18.376820 ignition[1127]: INFO : PUT result: OK Sep 13 00:46:18.378463 ignition[1127]: DEBUG : parsed url from cmdline: "" Sep 13 00:46:18.378463 ignition[1127]: INFO : no config URL provided Sep 13 00:46:18.378463 ignition[1127]: INFO : reading system config file "/usr/lib/ignition/user.ign" Sep 13 00:46:18.378463 ignition[1127]: INFO : no config at "/usr/lib/ignition/user.ign" Sep 13 00:46:18.381203 ignition[1127]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Sep 13 00:46:18.381203 ignition[1127]: INFO : PUT result: OK Sep 13 00:46:18.381203 ignition[1127]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Sep 13 00:46:18.381203 ignition[1127]: INFO : GET result: OK Sep 13 00:46:18.381203 ignition[1127]: DEBUG : parsing config with SHA512: d8025f5e4eda5eed67e5101acbc38392539a045862502ea0c2218b8c93bb2316c9fc88c290db4c435d0e7ad3fdaaa2d813baa3b074789bb9e4978c7e46c3d41a Sep 13 00:46:18.386004 unknown[1127]: fetched base config from "system" Sep 13 00:46:18.386014 unknown[1127]: fetched base config from "system" Sep 13 00:46:18.386624 ignition[1127]: fetch: fetch complete Sep 13 00:46:18.386020 unknown[1127]: fetched user config from "aws" Sep 13 00:46:18.386630 ignition[1127]: fetch: fetch passed Sep 13 00:46:18.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:18.388296 systemd[1]: Finished ignition-fetch.service. Sep 13 00:46:18.386670 ignition[1127]: Ignition finished successfully Sep 13 00:46:18.390072 systemd[1]: Starting ignition-kargs.service... Sep 13 00:46:18.400376 ignition[1133]: Ignition 2.14.0 Sep 13 00:46:18.400389 ignition[1133]: Stage: kargs Sep 13 00:46:18.400616 ignition[1133]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:46:18.400651 ignition[1133]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Sep 13 00:46:18.408347 ignition[1133]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Sep 13 00:46:18.409224 ignition[1133]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Sep 13 00:46:18.410022 ignition[1133]: INFO : PUT result: OK Sep 13 00:46:18.411710 ignition[1133]: kargs: kargs passed Sep 13 00:46:18.411776 ignition[1133]: Ignition finished successfully Sep 13 00:46:18.413769 systemd[1]: Finished ignition-kargs.service. Sep 13 00:46:18.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:18.415522 systemd[1]: Starting ignition-disks.service... Sep 13 00:46:18.424556 ignition[1139]: Ignition 2.14.0 Sep 13 00:46:18.424568 ignition[1139]: Stage: disks Sep 13 00:46:18.424773 ignition[1139]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:46:18.424807 ignition[1139]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Sep 13 00:46:18.432055 ignition[1139]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Sep 13 00:46:18.432994 ignition[1139]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Sep 13 00:46:18.433877 ignition[1139]: INFO : PUT result: OK Sep 13 00:46:18.437384 ignition[1139]: disks: disks passed Sep 13 00:46:18.437439 ignition[1139]: Ignition finished successfully Sep 13 00:46:18.439336 systemd[1]: Finished ignition-disks.service. Sep 13 00:46:18.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:18.440135 systemd[1]: Reached target initrd-root-device.target. Sep 13 00:46:18.440906 systemd[1]: Reached target local-fs-pre.target. Sep 13 00:46:18.441783 systemd[1]: Reached target local-fs.target. Sep 13 00:46:18.442672 systemd[1]: Reached target sysinit.target. Sep 13 00:46:18.443574 systemd[1]: Reached target basic.target. Sep 13 00:46:18.445664 systemd[1]: Starting systemd-fsck-root.service... Sep 13 00:46:18.480608 systemd-fsck[1147]: ROOT: clean, 629/553520 files, 56028/553472 blocks Sep 13 00:46:18.483314 systemd[1]: Finished systemd-fsck-root.service. Sep 13 00:46:18.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:18.484781 systemd[1]: Mounting sysroot.mount... Sep 13 00:46:18.503503 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Sep 13 00:46:18.504599 systemd[1]: Mounted sysroot.mount. Sep 13 00:46:18.506665 systemd[1]: Reached target initrd-root-fs.target. Sep 13 00:46:18.515579 systemd[1]: Mounting sysroot-usr.mount... Sep 13 00:46:18.516824 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Sep 13 00:46:18.516880 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Sep 13 00:46:18.516911 systemd[1]: Reached target ignition-diskful.target. Sep 13 00:46:18.520796 systemd[1]: Mounted sysroot-usr.mount. Sep 13 00:46:18.524324 systemd[1]: Starting initrd-setup-root.service... Sep 13 00:46:18.536286 initrd-setup-root[1168]: cut: /sysroot/etc/passwd: No such file or directory Sep 13 00:46:18.561392 initrd-setup-root[1176]: cut: /sysroot/etc/group: No such file or directory Sep 13 00:46:18.565587 initrd-setup-root[1184]: cut: /sysroot/etc/shadow: No such file or directory Sep 13 00:46:18.567232 systemd[1]: Mounting sysroot-usr-share-oem.mount... Sep 13 00:46:18.572617 initrd-setup-root[1193]: cut: /sysroot/etc/gshadow: No such file or directory Sep 13 00:46:18.585509 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/nvme0n1p6 scanned by mount (1190) Sep 13 00:46:18.589515 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Sep 13 00:46:18.589589 kernel: BTRFS info (device nvme0n1p6): using free space tree Sep 13 00:46:18.589620 kernel: BTRFS info (device nvme0n1p6): has skinny extents Sep 13 00:46:18.600508 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Sep 13 00:46:18.608946 systemd[1]: Mounted sysroot-usr-share-oem.mount. Sep 13 00:46:18.768218 systemd[1]: Finished initrd-setup-root.service. Sep 13 00:46:18.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:18.770558 systemd[1]: Starting ignition-mount.service... Sep 13 00:46:18.773526 systemd[1]: Starting sysroot-boot.service... Sep 13 00:46:18.778739 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Sep 13 00:46:18.778871 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Sep 13 00:46:18.791307 ignition[1229]: INFO : Ignition 2.14.0 Sep 13 00:46:18.791307 ignition[1229]: INFO : Stage: mount Sep 13 00:46:18.793662 ignition[1229]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:46:18.793662 ignition[1229]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Sep 13 00:46:18.806880 ignition[1229]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Sep 13 00:46:18.809896 ignition[1229]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Sep 13 00:46:18.812019 ignition[1229]: INFO : PUT result: OK Sep 13 00:46:18.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:18.816931 systemd[1]: Finished sysroot-boot.service. Sep 13 00:46:18.825981 ignition[1229]: INFO : mount: mount passed Sep 13 00:46:18.825981 ignition[1229]: INFO : Ignition finished successfully Sep 13 00:46:18.826342 systemd[1]: Finished ignition-mount.service. Sep 13 00:46:18.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:18.829891 systemd[1]: Starting ignition-files.service... Sep 13 00:46:18.840404 systemd[1]: Mounting sysroot-usr-share-oem.mount... Sep 13 00:46:18.857506 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by mount (1239) Sep 13 00:46:18.857558 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Sep 13 00:46:18.860531 kernel: BTRFS info (device nvme0n1p6): using free space tree Sep 13 00:46:18.860592 kernel: BTRFS info (device nvme0n1p6): has skinny extents Sep 13 00:46:18.907507 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Sep 13 00:46:18.911661 systemd[1]: Mounted sysroot-usr-share-oem.mount. Sep 13 00:46:18.923218 ignition[1258]: INFO : Ignition 2.14.0 Sep 13 00:46:18.923218 ignition[1258]: INFO : Stage: files Sep 13 00:46:18.925529 ignition[1258]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:46:18.925529 ignition[1258]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Sep 13 00:46:18.932612 ignition[1258]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Sep 13 00:46:18.933584 ignition[1258]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Sep 13 00:46:18.934409 ignition[1258]: INFO : PUT result: OK Sep 13 00:46:18.937094 ignition[1258]: DEBUG : files: compiled without relabeling support, skipping Sep 13 00:46:18.942728 ignition[1258]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Sep 13 00:46:18.942728 ignition[1258]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Sep 13 00:46:18.954017 ignition[1258]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Sep 13 00:46:18.955199 ignition[1258]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Sep 13 00:46:18.956351 ignition[1258]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Sep 13 00:46:18.955564 unknown[1258]: wrote ssh authorized keys file for user: core Sep 13 00:46:18.958185 ignition[1258]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" Sep 13 00:46:18.958185 ignition[1258]: INFO : GET https://get.helm.sh/helm-v3.17.0-linux-amd64.tar.gz: attempt #1 Sep 13 00:46:19.036245 ignition[1258]: INFO : GET result: OK Sep 13 00:46:19.349605 systemd-networkd[1103]: eth0: Gained IPv6LL Sep 13 00:46:19.421908 ignition[1258]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" Sep 13 00:46:19.421908 ignition[1258]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Sep 13 00:46:19.424631 ignition[1258]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Sep 13 00:46:19.428751 ignition[1258]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2010338185" Sep 13 00:46:19.430342 ignition[1258]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2010338185": device or resource busy Sep 13 00:46:19.430342 ignition[1258]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2010338185", trying btrfs: device or resource busy Sep 13 00:46:19.430342 ignition[1258]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2010338185" Sep 13 00:46:19.430342 ignition[1258]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2010338185" Sep 13 00:46:19.443798 ignition[1258]: INFO : op(3): [started] unmounting "/mnt/oem2010338185" Sep 13 00:46:19.443798 ignition[1258]: INFO : op(3): [finished] unmounting "/mnt/oem2010338185" Sep 13 00:46:19.445418 ignition[1258]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Sep 13 00:46:19.445418 ignition[1258]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/install.sh" Sep 13 00:46:19.445418 ignition[1258]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/install.sh" Sep 13 00:46:19.445418 ignition[1258]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nginx.yaml" Sep 13 00:46:19.445418 ignition[1258]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nginx.yaml" Sep 13 00:46:19.445418 ignition[1258]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Sep 13 00:46:19.445418 ignition[1258]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Sep 13 00:46:19.445418 ignition[1258]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Sep 13 00:46:19.445418 ignition[1258]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Sep 13 00:46:19.445418 ignition[1258]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Sep 13 00:46:19.445418 ignition[1258]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Sep 13 00:46:19.445418 ignition[1258]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Sep 13 00:46:19.445418 ignition[1258]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Sep 13 00:46:19.445418 ignition[1258]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Sep 13 00:46:19.445418 ignition[1258]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Sep 13 00:46:19.467498 ignition[1258]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2218345772" Sep 13 00:46:19.467498 ignition[1258]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2218345772": device or resource busy Sep 13 00:46:19.467498 ignition[1258]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2218345772", trying btrfs: device or resource busy Sep 13 00:46:19.467498 ignition[1258]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2218345772" Sep 13 00:46:19.467498 ignition[1258]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2218345772" Sep 13 00:46:19.467498 ignition[1258]: INFO : op(6): [started] unmounting "/mnt/oem2218345772" Sep 13 00:46:19.467498 ignition[1258]: INFO : op(6): [finished] unmounting "/mnt/oem2218345772" Sep 13 00:46:19.467498 ignition[1258]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Sep 13 00:46:19.467498 ignition[1258]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Sep 13 00:46:19.467498 ignition[1258]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Sep 13 00:46:19.467498 ignition[1258]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3269813929" Sep 13 00:46:19.467498 ignition[1258]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3269813929": device or resource busy Sep 13 00:46:19.467498 ignition[1258]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3269813929", trying btrfs: device or resource busy Sep 13 00:46:19.467498 ignition[1258]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3269813929" Sep 13 00:46:19.467498 ignition[1258]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3269813929" Sep 13 00:46:19.467498 ignition[1258]: INFO : op(9): [started] unmounting "/mnt/oem3269813929" Sep 13 00:46:19.467498 ignition[1258]: INFO : op(9): [finished] unmounting "/mnt/oem3269813929" Sep 13 00:46:19.467498 ignition[1258]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Sep 13 00:46:19.467498 ignition[1258]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Sep 13 00:46:19.467498 ignition[1258]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Sep 13 00:46:19.467498 ignition[1258]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3887851001" Sep 13 00:46:19.494110 ignition[1258]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3887851001": device or resource busy Sep 13 00:46:19.494110 ignition[1258]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3887851001", trying btrfs: device or resource busy Sep 13 00:46:19.494110 ignition[1258]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3887851001" Sep 13 00:46:19.494110 ignition[1258]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3887851001" Sep 13 00:46:19.494110 ignition[1258]: INFO : op(c): [started] unmounting "/mnt/oem3887851001" Sep 13 00:46:19.494110 ignition[1258]: INFO : op(c): [finished] unmounting "/mnt/oem3887851001" Sep 13 00:46:19.494110 ignition[1258]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Sep 13 00:46:19.494110 ignition[1258]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Sep 13 00:46:19.494110 ignition[1258]: INFO : GET https://extensions.flatcar.org/extensions/kubernetes-v1.32.4-x86-64.raw: attempt #1 Sep 13 00:46:19.878279 ignition[1258]: INFO : GET result: OK Sep 13 00:46:20.223191 ignition[1258]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Sep 13 00:46:20.223191 ignition[1258]: INFO : files: op(f): [started] processing unit "coreos-metadata-sshkeys@.service" Sep 13 00:46:20.223191 ignition[1258]: INFO : files: op(f): [finished] processing unit "coreos-metadata-sshkeys@.service" Sep 13 00:46:20.223191 ignition[1258]: INFO : files: op(10): [started] processing unit "amazon-ssm-agent.service" Sep 13 00:46:20.232583 ignition[1258]: INFO : files: op(10): op(11): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Sep 13 00:46:20.232583 ignition[1258]: INFO : files: op(10): op(11): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Sep 13 00:46:20.232583 ignition[1258]: INFO : files: op(10): [finished] processing unit "amazon-ssm-agent.service" Sep 13 00:46:20.232583 ignition[1258]: INFO : files: op(12): [started] processing unit "nvidia.service" Sep 13 00:46:20.232583 ignition[1258]: INFO : files: op(12): [finished] processing unit "nvidia.service" Sep 13 00:46:20.232583 ignition[1258]: INFO : files: op(13): [started] processing unit "prepare-helm.service" Sep 13 00:46:20.232583 ignition[1258]: INFO : files: op(13): op(14): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Sep 13 00:46:20.232583 ignition[1258]: INFO : files: op(13): op(14): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Sep 13 00:46:20.232583 ignition[1258]: INFO : files: op(13): [finished] processing unit "prepare-helm.service" Sep 13 00:46:20.232583 ignition[1258]: INFO : files: op(15): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Sep 13 00:46:20.232583 ignition[1258]: INFO : files: op(15): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Sep 13 00:46:20.232583 ignition[1258]: INFO : files: op(16): [started] setting preset to enabled for "amazon-ssm-agent.service" Sep 13 00:46:20.232583 ignition[1258]: INFO : files: op(16): [finished] setting preset to enabled for "amazon-ssm-agent.service" Sep 13 00:46:20.232583 ignition[1258]: INFO : files: op(17): [started] setting preset to enabled for "nvidia.service" Sep 13 00:46:20.232583 ignition[1258]: INFO : files: op(17): [finished] setting preset to enabled for "nvidia.service" Sep 13 00:46:20.232583 ignition[1258]: INFO : files: op(18): [started] setting preset to enabled for "prepare-helm.service" Sep 13 00:46:20.232583 ignition[1258]: INFO : files: op(18): [finished] setting preset to enabled for "prepare-helm.service" Sep 13 00:46:20.232583 ignition[1258]: INFO : files: createResultFile: createFiles: op(19): [started] writing file "/sysroot/etc/.ignition-result.json" Sep 13 00:46:20.232583 ignition[1258]: INFO : files: createResultFile: createFiles: op(19): [finished] writing file "/sysroot/etc/.ignition-result.json" Sep 13 00:46:20.232583 ignition[1258]: INFO : files: files passed Sep 13 00:46:20.232583 ignition[1258]: INFO : Ignition finished successfully Sep 13 00:46:20.321232 kernel: kauditd_printk_skb: 24 callbacks suppressed Sep 13 00:46:20.321270 kernel: audit: type=1130 audit(1757724380.237:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.321292 kernel: audit: type=1130 audit(1757724380.258:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.321312 kernel: audit: type=1131 audit(1757724380.258:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.321332 kernel: audit: type=1130 audit(1757724380.272:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.321353 kernel: audit: type=1130 audit(1757724380.308:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.321381 kernel: audit: type=1131 audit(1757724380.308:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.258000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.308000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.234821 systemd[1]: Finished ignition-files.service. Sep 13 00:46:20.247264 systemd[1]: Starting initrd-setup-root-after-ignition.service... Sep 13 00:46:20.326476 initrd-setup-root-after-ignition[1283]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Sep 13 00:46:20.250269 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Sep 13 00:46:20.252651 systemd[1]: Starting ignition-quench.service... Sep 13 00:46:20.257862 systemd[1]: ignition-quench.service: Deactivated successfully. Sep 13 00:46:20.257962 systemd[1]: Finished ignition-quench.service. Sep 13 00:46:20.269833 systemd[1]: Finished initrd-setup-root-after-ignition.service. Sep 13 00:46:20.273378 systemd[1]: Reached target ignition-complete.target. Sep 13 00:46:20.282771 systemd[1]: Starting initrd-parse-etc.service... Sep 13 00:46:20.306106 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Sep 13 00:46:20.306242 systemd[1]: Finished initrd-parse-etc.service. Sep 13 00:46:20.350080 kernel: audit: type=1130 audit(1757724380.341:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.308702 systemd[1]: Reached target initrd-fs.target. Sep 13 00:46:20.320545 systemd[1]: Reached target initrd.target. Sep 13 00:46:20.322328 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Sep 13 00:46:20.323680 systemd[1]: Starting dracut-pre-pivot.service... Sep 13 00:46:20.341025 systemd[1]: Finished dracut-pre-pivot.service. Sep 13 00:46:20.343351 systemd[1]: Starting initrd-cleanup.service... Sep 13 00:46:20.359139 systemd[1]: Stopped target nss-lookup.target. Sep 13 00:46:20.360717 systemd[1]: Stopped target remote-cryptsetup.target. Sep 13 00:46:20.361957 systemd[1]: Stopped target timers.target. Sep 13 00:46:20.363136 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Sep 13 00:46:20.369847 kernel: audit: type=1131 audit(1757724380.364:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.363346 systemd[1]: Stopped dracut-pre-pivot.service. Sep 13 00:46:20.364715 systemd[1]: Stopped target initrd.target. Sep 13 00:46:20.370722 systemd[1]: Stopped target basic.target. Sep 13 00:46:20.372014 systemd[1]: Stopped target ignition-complete.target. Sep 13 00:46:20.373194 systemd[1]: Stopped target ignition-diskful.target. Sep 13 00:46:20.374332 systemd[1]: Stopped target initrd-root-device.target. Sep 13 00:46:20.375500 systemd[1]: Stopped target remote-fs.target. Sep 13 00:46:20.376852 systemd[1]: Stopped target remote-fs-pre.target. Sep 13 00:46:20.378026 systemd[1]: Stopped target sysinit.target. Sep 13 00:46:20.379180 systemd[1]: Stopped target local-fs.target. Sep 13 00:46:20.380575 systemd[1]: Stopped target local-fs-pre.target. Sep 13 00:46:20.381685 systemd[1]: Stopped target swap.target. Sep 13 00:46:20.389204 kernel: audit: type=1131 audit(1757724380.383:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.383000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.382754 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Sep 13 00:46:20.382961 systemd[1]: Stopped dracut-pre-mount.service. Sep 13 00:46:20.396815 kernel: audit: type=1131 audit(1757724380.390:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.390000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.384205 systemd[1]: Stopped target cryptsetup.target. Sep 13 00:46:20.397000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.390084 systemd[1]: dracut-initqueue.service: Deactivated successfully. Sep 13 00:46:20.398000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.390304 systemd[1]: Stopped dracut-initqueue.service. Sep 13 00:46:20.391537 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Sep 13 00:46:20.391755 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Sep 13 00:46:20.397739 systemd[1]: ignition-files.service: Deactivated successfully. Sep 13 00:46:20.397953 systemd[1]: Stopped ignition-files.service. Sep 13 00:46:20.400568 systemd[1]: Stopping ignition-mount.service... Sep 13 00:46:20.408771 systemd[1]: Stopping iscsiuio.service... Sep 13 00:46:20.410873 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Sep 13 00:46:20.412237 systemd[1]: Stopped kmod-static-nodes.service. Sep 13 00:46:20.413000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.418080 ignition[1296]: INFO : Ignition 2.14.0 Sep 13 00:46:20.418080 ignition[1296]: INFO : Stage: umount Sep 13 00:46:20.418080 ignition[1296]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:46:20.418080 ignition[1296]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Sep 13 00:46:20.421531 systemd[1]: Stopping sysroot-boot.service... Sep 13 00:46:20.428000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.429000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.427054 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Sep 13 00:46:20.427367 systemd[1]: Stopped systemd-udev-trigger.service. Sep 13 00:46:20.428777 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Sep 13 00:46:20.437000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.428976 systemd[1]: Stopped dracut-pre-trigger.service. Sep 13 00:46:20.434217 systemd[1]: iscsiuio.service: Deactivated successfully. Sep 13 00:46:20.434353 systemd[1]: Stopped iscsiuio.service. Sep 13 00:46:20.439302 systemd[1]: initrd-cleanup.service: Deactivated successfully. Sep 13 00:46:20.439419 systemd[1]: Finished initrd-cleanup.service. Sep 13 00:46:20.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.445000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.447034 ignition[1296]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Sep 13 00:46:20.447034 ignition[1296]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Sep 13 00:46:20.447034 ignition[1296]: INFO : PUT result: OK Sep 13 00:46:20.450360 ignition[1296]: INFO : umount: umount passed Sep 13 00:46:20.450360 ignition[1296]: INFO : Ignition finished successfully Sep 13 00:46:20.453719 systemd[1]: ignition-mount.service: Deactivated successfully. Sep 13 00:46:20.453848 systemd[1]: Stopped ignition-mount.service. Sep 13 00:46:20.454000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.457000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.458000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.458000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.460000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.456637 systemd[1]: sysroot-boot.mount: Deactivated successfully. Sep 13 00:46:20.456947 systemd[1]: ignition-disks.service: Deactivated successfully. Sep 13 00:46:20.456984 systemd[1]: Stopped ignition-disks.service. Sep 13 00:46:20.457659 systemd[1]: ignition-kargs.service: Deactivated successfully. Sep 13 00:46:20.457702 systemd[1]: Stopped ignition-kargs.service. Sep 13 00:46:20.458621 systemd[1]: ignition-fetch.service: Deactivated successfully. Sep 13 00:46:20.458667 systemd[1]: Stopped ignition-fetch.service. Sep 13 00:46:20.459219 systemd[1]: Stopped target network.target. Sep 13 00:46:20.459717 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Sep 13 00:46:20.469000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.459757 systemd[1]: Stopped ignition-fetch-offline.service. Sep 13 00:46:20.460890 systemd[1]: Stopped target paths.target. Sep 13 00:46:20.461556 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Sep 13 00:46:20.463548 systemd[1]: Stopped systemd-ask-password-console.path. Sep 13 00:46:20.464381 systemd[1]: Stopped target slices.target. Sep 13 00:46:20.465532 systemd[1]: Stopped target sockets.target. Sep 13 00:46:20.466525 systemd[1]: iscsid.socket: Deactivated successfully. Sep 13 00:46:20.466568 systemd[1]: Closed iscsid.socket. Sep 13 00:46:20.467648 systemd[1]: iscsiuio.socket: Deactivated successfully. Sep 13 00:46:20.477000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.467710 systemd[1]: Closed iscsiuio.socket. Sep 13 00:46:20.468711 systemd[1]: ignition-setup.service: Deactivated successfully. Sep 13 00:46:20.480000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.468774 systemd[1]: Stopped ignition-setup.service. Sep 13 00:46:20.469911 systemd[1]: Stopping systemd-networkd.service... Sep 13 00:46:20.481000 audit: BPF prog-id=6 op=UNLOAD Sep 13 00:46:20.470994 systemd[1]: Stopping systemd-resolved.service... Sep 13 00:46:20.473537 systemd-networkd[1103]: eth0: DHCPv6 lease lost Sep 13 00:46:20.483000 audit: BPF prog-id=9 op=UNLOAD Sep 13 00:46:20.476440 systemd[1]: systemd-resolved.service: Deactivated successfully. Sep 13 00:46:20.476608 systemd[1]: Stopped systemd-resolved.service. Sep 13 00:46:20.486000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.478233 systemd[1]: systemd-networkd.service: Deactivated successfully. Sep 13 00:46:20.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.478369 systemd[1]: Stopped systemd-networkd.service. Sep 13 00:46:20.489000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.480980 systemd[1]: systemd-networkd.socket: Deactivated successfully. Sep 13 00:46:20.481024 systemd[1]: Closed systemd-networkd.socket. Sep 13 00:46:20.483804 systemd[1]: Stopping network-cleanup.service... Sep 13 00:46:20.486127 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Sep 13 00:46:20.486202 systemd[1]: Stopped parse-ip-for-networkd.service. Sep 13 00:46:20.487342 systemd[1]: systemd-sysctl.service: Deactivated successfully. Sep 13 00:46:20.487402 systemd[1]: Stopped systemd-sysctl.service. Sep 13 00:46:20.488613 systemd[1]: systemd-modules-load.service: Deactivated successfully. Sep 13 00:46:20.488670 systemd[1]: Stopped systemd-modules-load.service. Sep 13 00:46:20.495236 systemd[1]: Stopping systemd-udevd.service... Sep 13 00:46:20.497615 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Sep 13 00:46:20.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.501289 systemd[1]: systemd-udevd.service: Deactivated successfully. Sep 13 00:46:20.506000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.501549 systemd[1]: Stopped systemd-udevd.service. Sep 13 00:46:20.505817 systemd[1]: network-cleanup.service: Deactivated successfully. Sep 13 00:46:20.505954 systemd[1]: Stopped network-cleanup.service. Sep 13 00:46:20.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.508223 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Sep 13 00:46:20.514000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.508278 systemd[1]: Closed systemd-udevd-control.socket. Sep 13 00:46:20.515000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.509076 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Sep 13 00:46:20.520000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.509127 systemd[1]: Closed systemd-udevd-kernel.socket. Sep 13 00:46:20.510204 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Sep 13 00:46:20.510270 systemd[1]: Stopped dracut-pre-udev.service. Sep 13 00:46:20.513779 systemd[1]: dracut-cmdline.service: Deactivated successfully. Sep 13 00:46:20.513857 systemd[1]: Stopped dracut-cmdline.service. Sep 13 00:46:20.514938 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Sep 13 00:46:20.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.527000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.515002 systemd[1]: Stopped dracut-cmdline-ask.service. Sep 13 00:46:20.517389 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Sep 13 00:46:20.519591 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Sep 13 00:46:20.519671 systemd[1]: Stopped systemd-vconsole-setup.service. Sep 13 00:46:20.526944 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Sep 13 00:46:20.527046 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Sep 13 00:46:20.611224 systemd[1]: sysroot-boot.service: Deactivated successfully. Sep 13 00:46:20.611368 systemd[1]: Stopped sysroot-boot.service. Sep 13 00:46:20.612000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.612976 systemd[1]: Reached target initrd-switch-root.target. Sep 13 00:46:20.614022 systemd[1]: initrd-setup-root.service: Deactivated successfully. Sep 13 00:46:20.614000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:20.614105 systemd[1]: Stopped initrd-setup-root.service. Sep 13 00:46:20.616774 systemd[1]: Starting initrd-switch-root.service... Sep 13 00:46:20.633982 systemd[1]: Switching root. Sep 13 00:46:20.660146 iscsid[1108]: iscsid shutting down. Sep 13 00:46:20.661385 systemd-journald[185]: Received SIGTERM from PID 1 (n/a). Sep 13 00:46:20.661463 systemd-journald[185]: Journal stopped Sep 13 00:46:26.273251 kernel: SELinux: Class mctp_socket not defined in policy. Sep 13 00:46:26.273329 kernel: SELinux: Class anon_inode not defined in policy. Sep 13 00:46:26.273351 kernel: SELinux: the above unknown classes and permissions will be allowed Sep 13 00:46:26.273374 kernel: SELinux: policy capability network_peer_controls=1 Sep 13 00:46:26.273394 kernel: SELinux: policy capability open_perms=1 Sep 13 00:46:26.273413 kernel: SELinux: policy capability extended_socket_class=1 Sep 13 00:46:26.273435 kernel: SELinux: policy capability always_check_network=0 Sep 13 00:46:26.273458 kernel: SELinux: policy capability cgroup_seclabel=1 Sep 13 00:46:26.273477 kernel: SELinux: policy capability nnp_nosuid_transition=1 Sep 13 00:46:26.273511 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Sep 13 00:46:26.273530 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Sep 13 00:46:26.273551 systemd[1]: Successfully loaded SELinux policy in 115.367ms. Sep 13 00:46:26.273601 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 8.957ms. Sep 13 00:46:26.273623 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 13 00:46:26.273650 systemd[1]: Detected virtualization amazon. Sep 13 00:46:26.273671 systemd[1]: Detected architecture x86-64. Sep 13 00:46:26.273690 systemd[1]: Detected first boot. Sep 13 00:46:26.273715 systemd[1]: Initializing machine ID from VM UUID. Sep 13 00:46:26.273735 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Sep 13 00:46:26.273755 systemd[1]: Populated /etc with preset unit settings. Sep 13 00:46:26.273779 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 00:46:26.273805 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 00:46:26.273829 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 00:46:26.273849 kernel: kauditd_printk_skb: 47 callbacks suppressed Sep 13 00:46:26.273869 kernel: audit: type=1334 audit(1757724386.021:85): prog-id=12 op=LOAD Sep 13 00:46:26.273888 kernel: audit: type=1334 audit(1757724386.021:86): prog-id=3 op=UNLOAD Sep 13 00:46:26.273912 kernel: audit: type=1334 audit(1757724386.024:87): prog-id=13 op=LOAD Sep 13 00:46:26.273932 kernel: audit: type=1334 audit(1757724386.026:88): prog-id=14 op=LOAD Sep 13 00:46:26.273951 kernel: audit: type=1334 audit(1757724386.026:89): prog-id=4 op=UNLOAD Sep 13 00:46:26.273970 kernel: audit: type=1334 audit(1757724386.026:90): prog-id=5 op=UNLOAD Sep 13 00:46:26.273988 kernel: audit: type=1334 audit(1757724386.027:91): prog-id=15 op=LOAD Sep 13 00:46:26.274007 kernel: audit: type=1334 audit(1757724386.027:92): prog-id=12 op=UNLOAD Sep 13 00:46:26.274026 kernel: audit: type=1334 audit(1757724386.029:93): prog-id=16 op=LOAD Sep 13 00:46:26.274057 kernel: audit: type=1334 audit(1757724386.030:94): prog-id=17 op=LOAD Sep 13 00:46:26.274077 systemd[1]: iscsid.service: Deactivated successfully. Sep 13 00:46:26.274100 systemd[1]: Stopped iscsid.service. Sep 13 00:46:26.274121 systemd[1]: initrd-switch-root.service: Deactivated successfully. Sep 13 00:46:26.274142 systemd[1]: Stopped initrd-switch-root.service. Sep 13 00:46:26.274158 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Sep 13 00:46:26.274176 systemd[1]: Created slice system-addon\x2dconfig.slice. Sep 13 00:46:26.274195 systemd[1]: Created slice system-addon\x2drun.slice. Sep 13 00:46:26.274214 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Sep 13 00:46:26.274235 systemd[1]: Created slice system-getty.slice. Sep 13 00:46:26.274254 systemd[1]: Created slice system-modprobe.slice. Sep 13 00:46:26.274274 systemd[1]: Created slice system-serial\x2dgetty.slice. Sep 13 00:46:26.274292 systemd[1]: Created slice system-system\x2dcloudinit.slice. Sep 13 00:46:26.274311 systemd[1]: Created slice system-systemd\x2dfsck.slice. Sep 13 00:46:26.274329 systemd[1]: Created slice user.slice. Sep 13 00:46:26.274348 systemd[1]: Started systemd-ask-password-console.path. Sep 13 00:46:26.274836 systemd[1]: Started systemd-ask-password-wall.path. Sep 13 00:46:26.274859 systemd[1]: Set up automount boot.automount. Sep 13 00:46:26.274880 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Sep 13 00:46:26.274899 systemd[1]: Stopped target initrd-switch-root.target. Sep 13 00:46:26.274918 systemd[1]: Stopped target initrd-fs.target. Sep 13 00:46:26.274936 systemd[1]: Stopped target initrd-root-fs.target. Sep 13 00:46:26.274954 systemd[1]: Reached target integritysetup.target. Sep 13 00:46:26.274973 systemd[1]: Reached target remote-cryptsetup.target. Sep 13 00:46:26.274993 systemd[1]: Reached target remote-fs.target. Sep 13 00:46:26.275011 systemd[1]: Reached target slices.target. Sep 13 00:46:26.275033 systemd[1]: Reached target swap.target. Sep 13 00:46:26.275060 systemd[1]: Reached target torcx.target. Sep 13 00:46:26.275079 systemd[1]: Reached target veritysetup.target. Sep 13 00:46:26.275098 systemd[1]: Listening on systemd-coredump.socket. Sep 13 00:46:26.275116 systemd[1]: Listening on systemd-initctl.socket. Sep 13 00:46:26.275134 systemd[1]: Listening on systemd-networkd.socket. Sep 13 00:46:26.275154 systemd[1]: Listening on systemd-udevd-control.socket. Sep 13 00:46:26.275172 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 13 00:46:26.275189 systemd[1]: Listening on systemd-userdbd.socket. Sep 13 00:46:26.275211 systemd[1]: Mounting dev-hugepages.mount... Sep 13 00:46:26.275234 systemd[1]: Mounting dev-mqueue.mount... Sep 13 00:46:26.275255 systemd[1]: Mounting media.mount... Sep 13 00:46:26.275277 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:46:26.275299 systemd[1]: Mounting sys-kernel-debug.mount... Sep 13 00:46:26.275319 systemd[1]: Mounting sys-kernel-tracing.mount... Sep 13 00:46:26.275339 systemd[1]: Mounting tmp.mount... Sep 13 00:46:26.275362 systemd[1]: Starting flatcar-tmpfiles.service... Sep 13 00:46:26.275384 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:46:26.275405 systemd[1]: Starting kmod-static-nodes.service... Sep 13 00:46:26.275426 systemd[1]: Starting modprobe@configfs.service... Sep 13 00:46:26.275447 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:46:26.275468 systemd[1]: Starting modprobe@drm.service... Sep 13 00:46:26.275509 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 00:46:26.275531 systemd[1]: Starting modprobe@fuse.service... Sep 13 00:46:26.275937 systemd[1]: Starting modprobe@loop.service... Sep 13 00:46:26.275971 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Sep 13 00:46:26.275992 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Sep 13 00:46:26.276012 systemd[1]: Stopped systemd-fsck-root.service. Sep 13 00:46:26.276033 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Sep 13 00:46:26.276054 systemd[1]: Stopped systemd-fsck-usr.service. Sep 13 00:46:26.276075 systemd[1]: Stopped systemd-journald.service. Sep 13 00:46:26.276097 systemd[1]: Starting systemd-journald.service... Sep 13 00:46:26.276119 systemd[1]: Starting systemd-modules-load.service... Sep 13 00:46:26.276136 kernel: loop: module loaded Sep 13 00:46:26.276158 systemd[1]: Starting systemd-network-generator.service... Sep 13 00:46:26.276174 systemd[1]: Starting systemd-remount-fs.service... Sep 13 00:46:26.276191 systemd[1]: Starting systemd-udev-trigger.service... Sep 13 00:46:26.276208 systemd[1]: verity-setup.service: Deactivated successfully. Sep 13 00:46:26.276226 systemd[1]: Stopped verity-setup.service. Sep 13 00:46:26.276244 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:46:26.276261 kernel: fuse: init (API version 7.34) Sep 13 00:46:26.276281 systemd[1]: Mounted dev-hugepages.mount. Sep 13 00:46:26.276305 systemd-journald[1407]: Journal started Sep 13 00:46:26.276384 systemd-journald[1407]: Runtime Journal (/run/log/journal/ec2feddcaa1b87e72865e738adc819dc) is 4.8M, max 38.3M, 33.5M free. Sep 13 00:46:26.276441 systemd[1]: Mounted dev-mqueue.mount. Sep 13 00:46:21.494000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Sep 13 00:46:21.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 13 00:46:21.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 13 00:46:21.691000 audit: BPF prog-id=10 op=LOAD Sep 13 00:46:21.691000 audit: BPF prog-id=10 op=UNLOAD Sep 13 00:46:21.691000 audit: BPF prog-id=11 op=LOAD Sep 13 00:46:21.691000 audit: BPF prog-id=11 op=UNLOAD Sep 13 00:46:21.961000 audit[1329]: AVC avc: denied { associate } for pid=1329 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Sep 13 00:46:21.961000 audit[1329]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001078e4 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=1312 pid=1329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:21.961000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 13 00:46:21.964000 audit[1329]: AVC avc: denied { associate } for pid=1329 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Sep 13 00:46:21.964000 audit[1329]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001079c9 a2=1ed a3=0 items=2 ppid=1312 pid=1329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:21.964000 audit: CWD cwd="/" Sep 13 00:46:21.964000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:21.964000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:21.964000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 13 00:46:26.021000 audit: BPF prog-id=12 op=LOAD Sep 13 00:46:26.021000 audit: BPF prog-id=3 op=UNLOAD Sep 13 00:46:26.024000 audit: BPF prog-id=13 op=LOAD Sep 13 00:46:26.026000 audit: BPF prog-id=14 op=LOAD Sep 13 00:46:26.026000 audit: BPF prog-id=4 op=UNLOAD Sep 13 00:46:26.026000 audit: BPF prog-id=5 op=UNLOAD Sep 13 00:46:26.027000 audit: BPF prog-id=15 op=LOAD Sep 13 00:46:26.027000 audit: BPF prog-id=12 op=UNLOAD Sep 13 00:46:26.029000 audit: BPF prog-id=16 op=LOAD Sep 13 00:46:26.030000 audit: BPF prog-id=17 op=LOAD Sep 13 00:46:26.030000 audit: BPF prog-id=13 op=UNLOAD Sep 13 00:46:26.030000 audit: BPF prog-id=14 op=UNLOAD Sep 13 00:46:26.031000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:26.040000 audit: BPF prog-id=15 op=UNLOAD Sep 13 00:46:26.042000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:26.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:26.046000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:26.207000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:26.212000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:26.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:26.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:26.216000 audit: BPF prog-id=18 op=LOAD Sep 13 00:46:26.217000 audit: BPF prog-id=19 op=LOAD Sep 13 00:46:26.217000 audit: BPF prog-id=20 op=LOAD Sep 13 00:46:26.217000 audit: BPF prog-id=16 op=UNLOAD Sep 13 00:46:26.217000 audit: BPF prog-id=17 op=UNLOAD Sep 13 00:46:26.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:26.270000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Sep 13 00:46:26.270000 audit[1407]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffc349dbbf0 a2=4000 a3=7ffc349dbc8c items=0 ppid=1 pid=1407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:26.270000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Sep 13 00:46:21.942075 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2025-09-13T00:46:21Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 00:46:26.019545 systemd[1]: Queued start job for default target multi-user.target. Sep 13 00:46:21.943040 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2025-09-13T00:46:21Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 13 00:46:26.019559 systemd[1]: Unnecessary job was removed for dev-nvme0n1p6.device. Sep 13 00:46:21.943071 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2025-09-13T00:46:21Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 13 00:46:26.032086 systemd[1]: systemd-journald.service: Deactivated successfully. Sep 13 00:46:21.943116 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2025-09-13T00:46:21Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Sep 13 00:46:21.943132 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2025-09-13T00:46:21Z" level=debug msg="skipped missing lower profile" missing profile=oem Sep 13 00:46:21.943187 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2025-09-13T00:46:21Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Sep 13 00:46:21.943207 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2025-09-13T00:46:21Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Sep 13 00:46:21.943514 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2025-09-13T00:46:21Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Sep 13 00:46:21.943567 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2025-09-13T00:46:21Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 13 00:46:21.943587 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2025-09-13T00:46:21Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 13 00:46:21.952476 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2025-09-13T00:46:21Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Sep 13 00:46:21.952557 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2025-09-13T00:46:21Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Sep 13 00:46:21.952589 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2025-09-13T00:46:21Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Sep 13 00:46:21.952614 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2025-09-13T00:46:21Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Sep 13 00:46:21.952646 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2025-09-13T00:46:21Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Sep 13 00:46:21.952670 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2025-09-13T00:46:21Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Sep 13 00:46:25.411125 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2025-09-13T00:46:25Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:46:25.411402 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2025-09-13T00:46:25Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:46:25.411530 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2025-09-13T00:46:25Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:46:25.411738 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2025-09-13T00:46:25Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:46:25.411793 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2025-09-13T00:46:25Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Sep 13 00:46:25.411865 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2025-09-13T00:46:25Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Sep 13 00:46:26.294415 systemd[1]: Started systemd-journald.service. Sep 13 00:46:26.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:26.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:26.292000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:26.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:26.284535 systemd[1]: Mounted media.mount. Sep 13 00:46:26.287434 systemd[1]: Mounted sys-kernel-debug.mount. Sep 13 00:46:26.288648 systemd[1]: Mounted sys-kernel-tracing.mount. Sep 13 00:46:26.289656 systemd[1]: Mounted tmp.mount. Sep 13 00:46:26.290893 systemd[1]: Finished kmod-static-nodes.service. Sep 13 00:46:26.292120 systemd[1]: modprobe@configfs.service: Deactivated successfully. Sep 13 00:46:26.292295 systemd[1]: Finished modprobe@configfs.service. Sep 13 00:46:26.293462 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:46:26.293650 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:46:26.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:26.294000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:26.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:26.296000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:26.295817 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 13 00:46:26.295996 systemd[1]: Finished modprobe@drm.service. Sep 13 00:46:26.297155 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 00:46:26.297323 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 00:46:26.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:26.298000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:26.298981 systemd[1]: modprobe@fuse.service: Deactivated successfully. Sep 13 00:46:26.299147 systemd[1]: Finished modprobe@fuse.service. Sep 13 00:46:26.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:26.300000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:26.300866 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 00:46:26.301022 systemd[1]: Finished modprobe@loop.service. Sep 13 00:46:26.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:26.301000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:26.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:26.305000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:26.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:26.303799 systemd[1]: Finished systemd-modules-load.service. Sep 13 00:46:26.304882 systemd[1]: Finished systemd-network-generator.service. Sep 13 00:46:26.305960 systemd[1]: Finished systemd-remount-fs.service. Sep 13 00:46:26.309760 systemd[1]: Reached target network-pre.target. Sep 13 00:46:26.312738 systemd[1]: Mounting sys-fs-fuse-connections.mount... Sep 13 00:46:26.318071 systemd[1]: Mounting sys-kernel-config.mount... Sep 13 00:46:26.318908 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Sep 13 00:46:26.329810 systemd[1]: Starting systemd-hwdb-update.service... Sep 13 00:46:26.332548 systemd[1]: Starting systemd-journal-flush.service... Sep 13 00:46:26.333401 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 00:46:26.338764 systemd[1]: Starting systemd-random-seed.service... Sep 13 00:46:26.339577 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 00:46:26.343774 systemd[1]: Starting systemd-sysctl.service... Sep 13 00:46:26.346352 systemd[1]: Mounted sys-fs-fuse-connections.mount. Sep 13 00:46:26.347314 systemd[1]: Mounted sys-kernel-config.mount. Sep 13 00:46:26.366802 systemd-journald[1407]: Time spent on flushing to /var/log/journal/ec2feddcaa1b87e72865e738adc819dc is 64.614ms for 1219 entries. Sep 13 00:46:26.366802 systemd-journald[1407]: System Journal (/var/log/journal/ec2feddcaa1b87e72865e738adc819dc) is 8.0M, max 195.6M, 187.6M free. Sep 13 00:46:26.447913 systemd-journald[1407]: Received client request to flush runtime journal. Sep 13 00:46:26.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:26.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:26.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:26.370672 systemd[1]: Finished systemd-random-seed.service. Sep 13 00:46:26.371520 systemd[1]: Reached target first-boot-complete.target. Sep 13 00:46:26.398729 systemd[1]: Finished systemd-sysctl.service. Sep 13 00:46:26.447770 systemd[1]: Finished systemd-udev-trigger.service. Sep 13 00:46:26.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:26.452000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:26.450027 systemd[1]: Starting systemd-udev-settle.service... Sep 13 00:46:26.451148 systemd[1]: Finished systemd-journal-flush.service. Sep 13 00:46:26.452251 systemd[1]: Finished flatcar-tmpfiles.service. Sep 13 00:46:26.455571 systemd[1]: Starting systemd-sysusers.service... Sep 13 00:46:26.471805 udevadm[1445]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Sep 13 00:46:26.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:26.615068 systemd[1]: Finished systemd-sysusers.service. Sep 13 00:46:26.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:26.975000 audit: BPF prog-id=21 op=LOAD Sep 13 00:46:26.975000 audit: BPF prog-id=22 op=LOAD Sep 13 00:46:26.975000 audit: BPF prog-id=7 op=UNLOAD Sep 13 00:46:26.975000 audit: BPF prog-id=8 op=UNLOAD Sep 13 00:46:26.974535 systemd[1]: Finished systemd-hwdb-update.service. Sep 13 00:46:26.976372 systemd[1]: Starting systemd-udevd.service... Sep 13 00:46:26.994736 systemd-udevd[1448]: Using default interface naming scheme 'v252'. Sep 13 00:46:27.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:27.063000 audit: BPF prog-id=23 op=LOAD Sep 13 00:46:27.062367 systemd[1]: Started systemd-udevd.service. Sep 13 00:46:27.064583 systemd[1]: Starting systemd-networkd.service... Sep 13 00:46:27.082000 audit: BPF prog-id=24 op=LOAD Sep 13 00:46:27.082000 audit: BPF prog-id=25 op=LOAD Sep 13 00:46:27.082000 audit: BPF prog-id=26 op=LOAD Sep 13 00:46:27.084054 systemd[1]: Starting systemd-userdbd.service... Sep 13 00:46:27.102583 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Sep 13 00:46:27.115608 (udev-worker)[1450]: Network interface NamePolicy= disabled on kernel command line. Sep 13 00:46:27.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:27.118272 systemd[1]: Started systemd-userdbd.service. Sep 13 00:46:27.173000 audit[1449]: AVC avc: denied { confidentiality } for pid=1449 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Sep 13 00:46:27.173000 audit[1449]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5596b169e240 a1=338ec a2=7f2849f42bc5 a3=5 items=110 ppid=1448 pid=1449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:27.173000 audit: CWD cwd="/" Sep 13 00:46:27.173000 audit: PATH item=0 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=1 name=(null) inode=14662 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=2 name=(null) inode=14662 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=3 name=(null) inode=14663 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=4 name=(null) inode=14662 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=5 name=(null) inode=14664 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=6 name=(null) inode=14662 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=7 name=(null) inode=14665 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=8 name=(null) inode=14665 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=9 name=(null) inode=14666 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=10 name=(null) inode=14665 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=11 name=(null) inode=14667 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=12 name=(null) inode=14665 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=13 name=(null) inode=14668 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=14 name=(null) inode=14665 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=15 name=(null) inode=14669 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=16 name=(null) inode=14665 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=17 name=(null) inode=14670 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=18 name=(null) inode=14662 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=19 name=(null) inode=14671 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=20 name=(null) inode=14671 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=21 name=(null) inode=14672 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=22 name=(null) inode=14671 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=23 name=(null) inode=14673 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=24 name=(null) inode=14671 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=25 name=(null) inode=14674 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=26 name=(null) inode=14671 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=27 name=(null) inode=14675 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=28 name=(null) inode=14671 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=29 name=(null) inode=14676 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=30 name=(null) inode=14662 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=31 name=(null) inode=14677 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=32 name=(null) inode=14677 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=33 name=(null) inode=14678 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=34 name=(null) inode=14677 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=35 name=(null) inode=14679 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=36 name=(null) inode=14677 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=37 name=(null) inode=14680 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=38 name=(null) inode=14677 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=39 name=(null) inode=14681 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=40 name=(null) inode=14677 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=41 name=(null) inode=14682 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=42 name=(null) inode=14662 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=43 name=(null) inode=14683 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=44 name=(null) inode=14683 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=45 name=(null) inode=14684 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=46 name=(null) inode=14683 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=47 name=(null) inode=14685 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=48 name=(null) inode=14683 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=49 name=(null) inode=14686 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=50 name=(null) inode=14683 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=51 name=(null) inode=14687 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=52 name=(null) inode=14683 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=53 name=(null) inode=14688 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=54 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=55 name=(null) inode=14689 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=56 name=(null) inode=14689 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=57 name=(null) inode=14690 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=58 name=(null) inode=14689 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=59 name=(null) inode=14691 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=60 name=(null) inode=14689 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=61 name=(null) inode=14692 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=62 name=(null) inode=14692 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=63 name=(null) inode=14693 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=64 name=(null) inode=14692 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=65 name=(null) inode=14694 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=66 name=(null) inode=14692 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=67 name=(null) inode=14695 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=68 name=(null) inode=14692 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=69 name=(null) inode=14696 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=70 name=(null) inode=14692 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=71 name=(null) inode=14697 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=72 name=(null) inode=14689 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=73 name=(null) inode=14698 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=74 name=(null) inode=14698 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=75 name=(null) inode=14699 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=76 name=(null) inode=14698 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=77 name=(null) inode=14700 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=78 name=(null) inode=14698 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=79 name=(null) inode=14701 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=80 name=(null) inode=14698 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=81 name=(null) inode=14702 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=82 name=(null) inode=14698 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=83 name=(null) inode=14703 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=84 name=(null) inode=14689 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=85 name=(null) inode=14704 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=86 name=(null) inode=14704 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=87 name=(null) inode=14705 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=88 name=(null) inode=14704 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=89 name=(null) inode=14706 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=90 name=(null) inode=14704 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=91 name=(null) inode=14707 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=92 name=(null) inode=14704 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=93 name=(null) inode=14708 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=94 name=(null) inode=14704 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=95 name=(null) inode=14709 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=96 name=(null) inode=14689 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=97 name=(null) inode=14710 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=98 name=(null) inode=14710 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=99 name=(null) inode=14711 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=100 name=(null) inode=14710 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=101 name=(null) inode=14712 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=102 name=(null) inode=14710 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=103 name=(null) inode=14713 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=104 name=(null) inode=14710 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=105 name=(null) inode=14714 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=106 name=(null) inode=14710 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=107 name=(null) inode=14715 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PATH item=109 name=(null) inode=14716 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:46:27.173000 audit: PROCTITLE proctitle="(udev-worker)" Sep 13 00:46:27.195702 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Sep 13 00:46:27.209520 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input3 Sep 13 00:46:27.214166 systemd-networkd[1456]: lo: Link UP Sep 13 00:46:27.214177 systemd-networkd[1456]: lo: Gained carrier Sep 13 00:46:27.215068 systemd-networkd[1456]: Enumeration completed Sep 13 00:46:27.215166 systemd[1]: Started systemd-networkd.service. Sep 13 00:46:27.215417 systemd-networkd[1456]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 13 00:46:27.218386 kernel: ACPI: button: Power Button [PWRF] Sep 13 00:46:27.218470 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input4 Sep 13 00:46:27.218505 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:46:27.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:27.218356 systemd[1]: Starting systemd-networkd-wait-online.service... Sep 13 00:46:27.219585 kernel: ACPI: button: Sleep Button [SLPF] Sep 13 00:46:27.220100 systemd-networkd[1456]: eth0: Link UP Sep 13 00:46:27.220329 systemd-networkd[1456]: eth0: Gained carrier Sep 13 00:46:27.236527 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr Sep 13 00:46:27.239809 kernel: mousedev: PS/2 mouse device common for all mice Sep 13 00:46:27.236778 systemd-networkd[1456]: eth0: DHCPv4 address 172.31.26.227/20, gateway 172.31.16.1 acquired from 172.31.16.1 Sep 13 00:46:27.360670 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 13 00:46:27.363944 systemd[1]: Finished systemd-udev-settle.service. Sep 13 00:46:27.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:27.365804 systemd[1]: Starting lvm2-activation-early.service... Sep 13 00:46:27.412938 lvm[1562]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 13 00:46:27.442734 systemd[1]: Finished lvm2-activation-early.service. Sep 13 00:46:27.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:27.443395 systemd[1]: Reached target cryptsetup.target. Sep 13 00:46:27.445161 systemd[1]: Starting lvm2-activation.service... Sep 13 00:46:27.450036 lvm[1563]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 13 00:46:27.472159 systemd[1]: Finished lvm2-activation.service. Sep 13 00:46:27.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:27.472846 systemd[1]: Reached target local-fs-pre.target. Sep 13 00:46:27.473333 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Sep 13 00:46:27.473364 systemd[1]: Reached target local-fs.target. Sep 13 00:46:27.473842 systemd[1]: Reached target machines.target. Sep 13 00:46:27.475680 systemd[1]: Starting ldconfig.service... Sep 13 00:46:27.477030 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:46:27.477104 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:46:27.478287 systemd[1]: Starting systemd-boot-update.service... Sep 13 00:46:27.479993 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Sep 13 00:46:27.481536 systemd[1]: Starting systemd-machine-id-commit.service... Sep 13 00:46:27.483087 systemd[1]: Starting systemd-sysext.service... Sep 13 00:46:27.492811 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1565 (bootctl) Sep 13 00:46:27.494072 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Sep 13 00:46:27.498210 systemd[1]: Unmounting usr-share-oem.mount... Sep 13 00:46:27.504728 systemd[1]: usr-share-oem.mount: Deactivated successfully. Sep 13 00:46:27.504921 systemd[1]: Unmounted usr-share-oem.mount. Sep 13 00:46:27.520560 kernel: loop0: detected capacity change from 0 to 224512 Sep 13 00:46:27.530842 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Sep 13 00:46:27.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:27.661518 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Sep 13 00:46:27.666066 systemd-fsck[1575]: fsck.fat 4.2 (2021-01-31) Sep 13 00:46:27.666066 systemd-fsck[1575]: /dev/nvme0n1p1: 790 files, 120761/258078 clusters Sep 13 00:46:27.669389 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Sep 13 00:46:27.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:27.672127 systemd[1]: Mounting boot.mount... Sep 13 00:46:27.677914 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Sep 13 00:46:27.678761 systemd[1]: Finished systemd-machine-id-commit.service. Sep 13 00:46:27.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:27.683498 kernel: loop1: detected capacity change from 0 to 224512 Sep 13 00:46:27.692535 systemd[1]: Mounted boot.mount. Sep 13 00:46:27.704528 (sd-sysext)[1580]: Using extensions 'kubernetes'. Sep 13 00:46:27.705057 (sd-sysext)[1580]: Merged extensions into '/usr'. Sep 13 00:46:27.730855 systemd[1]: Finished systemd-boot-update.service. Sep 13 00:46:27.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:27.734594 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:46:27.736217 systemd[1]: Mounting usr-share-oem.mount... Sep 13 00:46:27.737452 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:46:27.741843 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:46:27.744221 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 00:46:27.746844 systemd[1]: Starting modprobe@loop.service... Sep 13 00:46:27.747728 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:46:27.747987 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:46:27.748224 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:46:27.752916 systemd[1]: Mounted usr-share-oem.mount. Sep 13 00:46:27.753845 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:46:27.754022 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:46:27.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:27.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:27.755010 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 00:46:27.755169 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 00:46:27.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:27.755000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:27.756084 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 00:46:27.756238 systemd[1]: Finished modprobe@loop.service. Sep 13 00:46:27.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:27.756000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:27.757231 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 00:46:27.757381 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 00:46:27.759040 systemd[1]: Finished systemd-sysext.service. Sep 13 00:46:27.759000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:27.761657 systemd[1]: Starting ensure-sysext.service... Sep 13 00:46:27.764251 systemd[1]: Starting systemd-tmpfiles-setup.service... Sep 13 00:46:27.774800 systemd[1]: Reloading. Sep 13 00:46:27.825029 systemd-tmpfiles[1598]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Sep 13 00:46:27.843997 systemd-tmpfiles[1598]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Sep 13 00:46:27.863350 systemd-tmpfiles[1598]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Sep 13 00:46:27.871208 /usr/lib/systemd/system-generators/torcx-generator[1620]: time="2025-09-13T00:46:27Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 00:46:27.871248 /usr/lib/systemd/system-generators/torcx-generator[1620]: time="2025-09-13T00:46:27Z" level=info msg="torcx already run" Sep 13 00:46:27.990682 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 00:46:27.990884 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 00:46:28.015609 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 00:46:28.131000 audit: BPF prog-id=27 op=LOAD Sep 13 00:46:28.131000 audit: BPF prog-id=24 op=UNLOAD Sep 13 00:46:28.132000 audit: BPF prog-id=28 op=LOAD Sep 13 00:46:28.132000 audit: BPF prog-id=29 op=LOAD Sep 13 00:46:28.132000 audit: BPF prog-id=25 op=UNLOAD Sep 13 00:46:28.132000 audit: BPF prog-id=26 op=UNLOAD Sep 13 00:46:28.135000 audit: BPF prog-id=30 op=LOAD Sep 13 00:46:28.135000 audit: BPF prog-id=23 op=UNLOAD Sep 13 00:46:28.136000 audit: BPF prog-id=31 op=LOAD Sep 13 00:46:28.136000 audit: BPF prog-id=32 op=LOAD Sep 13 00:46:28.136000 audit: BPF prog-id=21 op=UNLOAD Sep 13 00:46:28.136000 audit: BPF prog-id=22 op=UNLOAD Sep 13 00:46:28.137000 audit: BPF prog-id=33 op=LOAD Sep 13 00:46:28.137000 audit: BPF prog-id=18 op=UNLOAD Sep 13 00:46:28.137000 audit: BPF prog-id=34 op=LOAD Sep 13 00:46:28.137000 audit: BPF prog-id=35 op=LOAD Sep 13 00:46:28.137000 audit: BPF prog-id=19 op=UNLOAD Sep 13 00:46:28.137000 audit: BPF prog-id=20 op=UNLOAD Sep 13 00:46:28.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:28.146210 systemd[1]: Finished systemd-tmpfiles-setup.service. Sep 13 00:46:28.151882 systemd[1]: Starting audit-rules.service... Sep 13 00:46:28.154706 systemd[1]: Starting clean-ca-certificates.service... Sep 13 00:46:28.160000 audit: BPF prog-id=36 op=LOAD Sep 13 00:46:28.164000 audit: BPF prog-id=37 op=LOAD Sep 13 00:46:28.158231 systemd[1]: Starting systemd-journal-catalog-update.service... Sep 13 00:46:28.163229 systemd[1]: Starting systemd-resolved.service... Sep 13 00:46:28.169253 systemd[1]: Starting systemd-timesyncd.service... Sep 13 00:46:28.172616 systemd[1]: Starting systemd-update-utmp.service... Sep 13 00:46:28.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:28.178420 systemd[1]: Finished clean-ca-certificates.service. Sep 13 00:46:28.179330 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 13 00:46:28.195916 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:46:28.196000 audit[1680]: SYSTEM_BOOT pid=1680 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Sep 13 00:46:28.201150 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:46:28.203784 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 00:46:28.207685 systemd[1]: Starting modprobe@loop.service... Sep 13 00:46:28.209337 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:46:28.209562 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:46:28.209748 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 13 00:46:28.211299 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:46:28.212336 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:46:28.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:28.213000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:28.214029 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 00:46:28.214203 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 00:46:28.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:28.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:28.216534 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 00:46:28.217147 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 00:46:28.217335 systemd[1]: Finished modprobe@loop.service. Sep 13 00:46:28.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:28.218000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:28.222800 systemd[1]: Finished systemd-update-utmp.service. Sep 13 00:46:28.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:28.226639 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:46:28.229635 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:46:28.232825 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 00:46:28.236416 systemd[1]: Starting modprobe@loop.service... Sep 13 00:46:28.238626 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:46:28.238856 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:46:28.239067 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 13 00:46:28.244846 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:46:28.245023 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:46:28.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:28.246000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:28.247386 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:46:28.250447 systemd[1]: Starting modprobe@drm.service... Sep 13 00:46:28.251773 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:46:28.251989 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:46:28.252191 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 13 00:46:28.253234 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 00:46:28.253412 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 00:46:28.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:28.255000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:28.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:28.257000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:28.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:28.256842 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 13 00:46:28.257013 systemd[1]: Finished modprobe@drm.service. Sep 13 00:46:28.258347 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 00:46:28.261081 systemd[1]: Finished ensure-sysext.service. Sep 13 00:46:28.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:28.265000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:28.265674 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 00:46:28.265857 systemd[1]: Finished modprobe@loop.service. Sep 13 00:46:28.266637 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 00:46:28.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:28.275746 systemd[1]: Finished systemd-journal-catalog-update.service. Sep 13 00:46:28.344175 systemd[1]: Started systemd-timesyncd.service. Sep 13 00:46:28.344868 systemd[1]: Reached target time-set.target. Sep 13 00:46:28.344000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:28.345935 augenrules[1701]: No rules Sep 13 00:46:28.345000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Sep 13 00:46:28.345000 audit[1701]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc3563bb60 a2=420 a3=0 items=0 ppid=1674 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:28.345000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Sep 13 00:46:28.346779 systemd[1]: Finished audit-rules.service. Sep 13 00:46:28.356024 systemd-resolved[1678]: Positive Trust Anchors: Sep 13 00:46:28.356351 systemd-resolved[1678]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 13 00:46:28.356432 systemd-resolved[1678]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 13 00:46:28.400060 systemd-resolved[1678]: Defaulting to hostname 'linux'. Sep 13 00:46:28.402977 systemd[1]: Started systemd-resolved.service. Sep 13 00:46:28.403597 systemd[1]: Reached target network.target. Sep 13 00:46:28.404161 systemd[1]: Reached target nss-lookup.target. Sep 13 00:46:29.287407 systemd-timesyncd[1679]: Contacted time server 69.89.207.199:123 (0.flatcar.pool.ntp.org). Sep 13 00:46:29.287407 systemd-resolved[1678]: Clock change detected. Flushing caches. Sep 13 00:46:29.287493 systemd-timesyncd[1679]: Initial clock synchronization to Sat 2025-09-13 00:46:29.287231 UTC. Sep 13 00:46:29.305351 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:46:29.305372 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:46:29.567137 ldconfig[1564]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Sep 13 00:46:29.576596 systemd[1]: Finished ldconfig.service. Sep 13 00:46:29.578293 systemd[1]: Starting systemd-update-done.service... Sep 13 00:46:29.586324 systemd[1]: Finished systemd-update-done.service. Sep 13 00:46:29.586823 systemd[1]: Reached target sysinit.target. Sep 13 00:46:29.587258 systemd[1]: Started motdgen.path. Sep 13 00:46:29.587631 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Sep 13 00:46:29.588274 systemd[1]: Started logrotate.timer. Sep 13 00:46:29.588704 systemd[1]: Started mdadm.timer. Sep 13 00:46:29.589021 systemd[1]: Started systemd-tmpfiles-clean.timer. Sep 13 00:46:29.589344 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Sep 13 00:46:29.589376 systemd[1]: Reached target paths.target. Sep 13 00:46:29.589687 systemd[1]: Reached target timers.target. Sep 13 00:46:29.590302 systemd[1]: Listening on dbus.socket. Sep 13 00:46:29.591643 systemd[1]: Starting docker.socket... Sep 13 00:46:29.595280 systemd[1]: Listening on sshd.socket. Sep 13 00:46:29.595781 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:46:29.596437 systemd[1]: Listening on docker.socket. Sep 13 00:46:29.596858 systemd[1]: Reached target sockets.target. Sep 13 00:46:29.597163 systemd[1]: Reached target basic.target. Sep 13 00:46:29.597497 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 13 00:46:29.597530 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 13 00:46:29.598536 systemd[1]: Starting containerd.service... Sep 13 00:46:29.599891 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Sep 13 00:46:29.601413 systemd[1]: Starting dbus.service... Sep 13 00:46:29.602921 systemd[1]: Starting enable-oem-cloudinit.service... Sep 13 00:46:29.604576 systemd[1]: Starting extend-filesystems.service... Sep 13 00:46:29.604991 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Sep 13 00:46:29.606227 systemd[1]: Starting motdgen.service... Sep 13 00:46:29.610180 systemd[1]: Starting prepare-helm.service... Sep 13 00:46:29.629862 jq[1713]: false Sep 13 00:46:29.611634 systemd[1]: Starting ssh-key-proc-cmdline.service... Sep 13 00:46:29.613235 systemd[1]: Starting sshd-keygen.service... Sep 13 00:46:29.618775 systemd[1]: Starting systemd-logind.service... Sep 13 00:46:29.619178 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:46:29.619265 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Sep 13 00:46:29.619771 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Sep 13 00:46:29.621420 systemd[1]: Starting update-engine.service... Sep 13 00:46:29.623997 systemd[1]: Starting update-ssh-keys-after-ignition.service... Sep 13 00:46:29.628045 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Sep 13 00:46:29.641063 jq[1721]: true Sep 13 00:46:29.628256 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Sep 13 00:46:29.647780 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Sep 13 00:46:29.648968 tar[1723]: linux-amd64/LICENSE Sep 13 00:46:29.648051 systemd[1]: Finished ssh-key-proc-cmdline.service. Sep 13 00:46:29.652480 tar[1723]: linux-amd64/helm Sep 13 00:46:29.652920 jq[1730]: true Sep 13 00:46:29.686483 extend-filesystems[1714]: Found loop1 Sep 13 00:46:29.686483 extend-filesystems[1714]: Found nvme0n1 Sep 13 00:46:29.686483 extend-filesystems[1714]: Found nvme0n1p1 Sep 13 00:46:29.686483 extend-filesystems[1714]: Found nvme0n1p2 Sep 13 00:46:29.686483 extend-filesystems[1714]: Found nvme0n1p3 Sep 13 00:46:29.686483 extend-filesystems[1714]: Found usr Sep 13 00:46:29.686483 extend-filesystems[1714]: Found nvme0n1p4 Sep 13 00:46:29.686483 extend-filesystems[1714]: Found nvme0n1p6 Sep 13 00:46:29.686483 extend-filesystems[1714]: Found nvme0n1p7 Sep 13 00:46:29.686483 extend-filesystems[1714]: Found nvme0n1p9 Sep 13 00:46:29.686483 extend-filesystems[1714]: Checking size of /dev/nvme0n1p9 Sep 13 00:46:29.704327 dbus-daemon[1712]: [system] SELinux support is enabled Sep 13 00:46:29.694853 systemd[1]: motdgen.service: Deactivated successfully. Sep 13 00:46:29.741447 extend-filesystems[1714]: Resized partition /dev/nvme0n1p9 Sep 13 00:46:29.707425 dbus-daemon[1712]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1456 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Sep 13 00:46:29.695030 systemd[1]: Finished motdgen.service. Sep 13 00:46:29.723448 dbus-daemon[1712]: [system] Successfully activated service 'org.freedesktop.systemd1' Sep 13 00:46:29.704510 systemd[1]: Started dbus.service. Sep 13 00:46:29.711629 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Sep 13 00:46:29.711656 systemd[1]: Reached target system-config.target. Sep 13 00:46:29.712031 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Sep 13 00:46:29.712048 systemd[1]: Reached target user-config.target. Sep 13 00:46:29.727017 systemd[1]: Starting systemd-hostnamed.service... Sep 13 00:46:29.746271 extend-filesystems[1762]: resize2fs 1.46.5 (30-Dec-2021) Sep 13 00:46:29.749690 systemd-networkd[1456]: eth0: Gained IPv6LL Sep 13 00:46:29.752125 systemd[1]: Finished systemd-networkd-wait-online.service. Sep 13 00:46:29.752716 systemd[1]: Reached target network-online.target. Sep 13 00:46:29.754212 systemd[1]: Started amazon-ssm-agent.service. Sep 13 00:46:29.756744 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Sep 13 00:46:29.766291 systemd[1]: Starting kubelet.service... Sep 13 00:46:29.767985 systemd[1]: Started nvidia.service. Sep 13 00:46:29.935915 update_engine[1720]: I0913 00:46:29.828781 1720 main.cc:92] Flatcar Update Engine starting Sep 13 00:46:29.935915 update_engine[1720]: I0913 00:46:29.859599 1720 update_check_scheduler.cc:74] Next update check in 2m10s Sep 13 00:46:29.854930 systemd[1]: Started update-engine.service. Sep 13 00:46:29.858343 systemd[1]: Started locksmithd.service. Sep 13 00:46:29.945569 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Sep 13 00:46:29.962383 extend-filesystems[1762]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Sep 13 00:46:29.962383 extend-filesystems[1762]: old_desc_blocks = 1, new_desc_blocks = 1 Sep 13 00:46:29.962383 extend-filesystems[1762]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Sep 13 00:46:29.969918 extend-filesystems[1714]: Resized filesystem in /dev/nvme0n1p9 Sep 13 00:46:29.964876 systemd[1]: extend-filesystems.service: Deactivated successfully. Sep 13 00:46:29.999797 env[1726]: time="2025-09-13T00:46:29.990218274Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Sep 13 00:46:30.001019 bash[1768]: Updated "/home/core/.ssh/authorized_keys" Sep 13 00:46:29.965124 systemd[1]: Finished extend-filesystems.service. Sep 13 00:46:29.984887 systemd[1]: Finished update-ssh-keys-after-ignition.service. Sep 13 00:46:30.006722 systemd-logind[1719]: Watching system buttons on /dev/input/event1 (Power Button) Sep 13 00:46:30.006753 systemd-logind[1719]: Watching system buttons on /dev/input/event3 (Sleep Button) Sep 13 00:46:30.006780 systemd-logind[1719]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Sep 13 00:46:30.011642 systemd-logind[1719]: New seat seat0. Sep 13 00:46:30.038088 systemd[1]: Started systemd-logind.service. Sep 13 00:46:30.039974 amazon-ssm-agent[1767]: 2025/09/13 00:46:30 Failed to load instance info from vault. RegistrationKey does not exist. Sep 13 00:46:30.047790 amazon-ssm-agent[1767]: Initializing new seelog logger Sep 13 00:46:30.049459 amazon-ssm-agent[1767]: New Seelog Logger Creation Complete Sep 13 00:46:30.049459 amazon-ssm-agent[1767]: 2025/09/13 00:46:30 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Sep 13 00:46:30.049459 amazon-ssm-agent[1767]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Sep 13 00:46:30.049459 amazon-ssm-agent[1767]: 2025/09/13 00:46:30 processing appconfig overrides Sep 13 00:46:30.126150 dbus-daemon[1712]: [system] Successfully activated service 'org.freedesktop.hostname1' Sep 13 00:46:30.126343 systemd[1]: Started systemd-hostnamed.service. Sep 13 00:46:30.129704 dbus-daemon[1712]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1758 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Sep 13 00:46:30.133652 systemd[1]: Starting polkit.service... Sep 13 00:46:30.162370 polkitd[1815]: Started polkitd version 121 Sep 13 00:46:30.191527 polkitd[1815]: Loading rules from directory /etc/polkit-1/rules.d Sep 13 00:46:30.195365 polkitd[1815]: Loading rules from directory /usr/share/polkit-1/rules.d Sep 13 00:46:30.203074 polkitd[1815]: Finished loading, compiling and executing 2 rules Sep 13 00:46:30.204869 dbus-daemon[1712]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Sep 13 00:46:30.205053 systemd[1]: Started polkit.service. Sep 13 00:46:30.205514 env[1726]: time="2025-09-13T00:46:30.205472947Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Sep 13 00:46:30.205777 env[1726]: time="2025-09-13T00:46:30.205751337Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:46:30.209010 env[1726]: time="2025-09-13T00:46:30.208966527Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.192-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Sep 13 00:46:30.209138 env[1726]: time="2025-09-13T00:46:30.209119346Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:46:30.209575 env[1726]: time="2025-09-13T00:46:30.209529526Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 13 00:46:30.211097 polkitd[1815]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Sep 13 00:46:30.215193 env[1726]: time="2025-09-13T00:46:30.215154528Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Sep 13 00:46:30.215335 env[1726]: time="2025-09-13T00:46:30.215312709Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Sep 13 00:46:30.215410 env[1726]: time="2025-09-13T00:46:30.215394153Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Sep 13 00:46:30.215646 env[1726]: time="2025-09-13T00:46:30.215619488Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:46:30.220972 env[1726]: time="2025-09-13T00:46:30.220931343Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:46:30.225644 env[1726]: time="2025-09-13T00:46:30.225587539Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 13 00:46:30.229182 env[1726]: time="2025-09-13T00:46:30.229129562Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Sep 13 00:46:30.229471 env[1726]: time="2025-09-13T00:46:30.229433527Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Sep 13 00:46:30.229619 env[1726]: time="2025-09-13T00:46:30.229600016Z" level=info msg="metadata content store policy set" policy=shared Sep 13 00:46:30.240537 env[1726]: time="2025-09-13T00:46:30.240495876Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Sep 13 00:46:30.240721 env[1726]: time="2025-09-13T00:46:30.240701811Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Sep 13 00:46:30.240798 env[1726]: time="2025-09-13T00:46:30.240784135Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Sep 13 00:46:30.240908 env[1726]: time="2025-09-13T00:46:30.240892995Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Sep 13 00:46:30.241035 env[1726]: time="2025-09-13T00:46:30.241021030Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Sep 13 00:46:30.241129 env[1726]: time="2025-09-13T00:46:30.241114771Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Sep 13 00:46:30.241200 env[1726]: time="2025-09-13T00:46:30.241186683Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Sep 13 00:46:30.241272 env[1726]: time="2025-09-13T00:46:30.241259583Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Sep 13 00:46:30.241346 env[1726]: time="2025-09-13T00:46:30.241332248Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Sep 13 00:46:30.241417 env[1726]: time="2025-09-13T00:46:30.241404138Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Sep 13 00:46:30.241486 env[1726]: time="2025-09-13T00:46:30.241473594Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Sep 13 00:46:30.241580 env[1726]: time="2025-09-13T00:46:30.241566253Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Sep 13 00:46:30.241788 env[1726]: time="2025-09-13T00:46:30.241770531Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Sep 13 00:46:30.241960 env[1726]: time="2025-09-13T00:46:30.241942336Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Sep 13 00:46:30.242484 env[1726]: time="2025-09-13T00:46:30.242460767Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Sep 13 00:46:30.242630 env[1726]: time="2025-09-13T00:46:30.242611006Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Sep 13 00:46:30.242710 env[1726]: time="2025-09-13T00:46:30.242694541Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Sep 13 00:46:30.242852 env[1726]: time="2025-09-13T00:46:30.242833892Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Sep 13 00:46:30.243027 env[1726]: time="2025-09-13T00:46:30.243007120Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Sep 13 00:46:30.243130 env[1726]: time="2025-09-13T00:46:30.243115147Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Sep 13 00:46:30.243202 env[1726]: time="2025-09-13T00:46:30.243187928Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Sep 13 00:46:30.243270 env[1726]: time="2025-09-13T00:46:30.243257921Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Sep 13 00:46:30.243340 env[1726]: time="2025-09-13T00:46:30.243325758Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Sep 13 00:46:30.243415 env[1726]: time="2025-09-13T00:46:30.243402915Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Sep 13 00:46:30.243493 env[1726]: time="2025-09-13T00:46:30.243478008Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Sep 13 00:46:30.243604 env[1726]: time="2025-09-13T00:46:30.243587128Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Sep 13 00:46:30.243847 env[1726]: time="2025-09-13T00:46:30.243827381Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Sep 13 00:46:30.243960 env[1726]: time="2025-09-13T00:46:30.243942581Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Sep 13 00:46:30.244051 env[1726]: time="2025-09-13T00:46:30.244036742Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Sep 13 00:46:30.244126 env[1726]: time="2025-09-13T00:46:30.244111327Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Sep 13 00:46:30.244290 env[1726]: time="2025-09-13T00:46:30.244268326Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Sep 13 00:46:30.244367 env[1726]: time="2025-09-13T00:46:30.244352800Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Sep 13 00:46:30.244447 env[1726]: time="2025-09-13T00:46:30.244432482Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Sep 13 00:46:30.244585 env[1726]: time="2025-09-13T00:46:30.244537728Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Sep 13 00:46:30.244996 env[1726]: time="2025-09-13T00:46:30.244924108Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Sep 13 00:46:30.245636 systemd-hostnamed[1758]: Hostname set to (transient) Sep 13 00:46:30.248504 env[1726]: time="2025-09-13T00:46:30.245140351Z" level=info msg="Connect containerd service" Sep 13 00:46:30.248504 env[1726]: time="2025-09-13T00:46:30.245191224Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Sep 13 00:46:30.248504 env[1726]: time="2025-09-13T00:46:30.246038433Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 13 00:46:30.245762 systemd-resolved[1678]: System hostname changed to 'ip-172-31-26-227'. Sep 13 00:46:30.248956 env[1726]: time="2025-09-13T00:46:30.248930244Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Sep 13 00:46:30.249077 env[1726]: time="2025-09-13T00:46:30.249062602Z" level=info msg=serving... address=/run/containerd/containerd.sock Sep 13 00:46:30.252948 env[1726]: time="2025-09-13T00:46:30.252916445Z" level=info msg="containerd successfully booted in 0.330350s" Sep 13 00:46:30.253004 systemd[1]: Started containerd.service. Sep 13 00:46:30.253581 env[1726]: time="2025-09-13T00:46:30.253518347Z" level=info msg="Start subscribing containerd event" Sep 13 00:46:30.275461 systemd[1]: nvidia.service: Deactivated successfully. Sep 13 00:46:30.298537 env[1726]: time="2025-09-13T00:46:30.298483928Z" level=info msg="Start recovering state" Sep 13 00:46:30.301292 env[1726]: time="2025-09-13T00:46:30.301249959Z" level=info msg="Start event monitor" Sep 13 00:46:30.301987 env[1726]: time="2025-09-13T00:46:30.301955165Z" level=info msg="Start snapshots syncer" Sep 13 00:46:30.302252 env[1726]: time="2025-09-13T00:46:30.302233792Z" level=info msg="Start cni network conf syncer for default" Sep 13 00:46:30.302332 env[1726]: time="2025-09-13T00:46:30.302318771Z" level=info msg="Start streaming server" Sep 13 00:46:30.609061 coreos-metadata[1711]: Sep 13 00:46:30.606 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Sep 13 00:46:30.614364 coreos-metadata[1711]: Sep 13 00:46:30.614 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Sep 13 00:46:30.622523 coreos-metadata[1711]: Sep 13 00:46:30.622 INFO Fetch successful Sep 13 00:46:30.622729 coreos-metadata[1711]: Sep 13 00:46:30.622 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Sep 13 00:46:30.625670 coreos-metadata[1711]: Sep 13 00:46:30.625 INFO Fetch successful Sep 13 00:46:30.629333 unknown[1711]: wrote ssh authorized keys file for user: core Sep 13 00:46:30.662483 update-ssh-keys[1898]: Updated "/home/core/.ssh/authorized_keys" Sep 13 00:46:30.663172 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Sep 13 00:46:30.718813 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO Create new startup processor Sep 13 00:46:30.718986 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO [LongRunningPluginsManager] registered plugins: {} Sep 13 00:46:30.719056 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO Initializing bookkeeping folders Sep 13 00:46:30.719056 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO removing the completed state files Sep 13 00:46:30.719056 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO Initializing bookkeeping folders for long running plugins Sep 13 00:46:30.719056 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Sep 13 00:46:30.719056 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO Initializing healthcheck folders for long running plugins Sep 13 00:46:30.719056 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO Initializing locations for inventory plugin Sep 13 00:46:30.719287 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO Initializing default location for custom inventory Sep 13 00:46:30.719287 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO Initializing default location for file inventory Sep 13 00:46:30.719287 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO Initializing default location for role inventory Sep 13 00:46:30.719287 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO Init the cloudwatchlogs publisher Sep 13 00:46:30.719287 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO [instanceID=i-0bfc46ebbe361372c] Successfully loaded platform independent plugin aws:updateSsmAgent Sep 13 00:46:30.719287 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO [instanceID=i-0bfc46ebbe361372c] Successfully loaded platform independent plugin aws:refreshAssociation Sep 13 00:46:30.719287 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO [instanceID=i-0bfc46ebbe361372c] Successfully loaded platform independent plugin aws:runDocument Sep 13 00:46:30.719287 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO [instanceID=i-0bfc46ebbe361372c] Successfully loaded platform independent plugin aws:downloadContent Sep 13 00:46:30.719287 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO [instanceID=i-0bfc46ebbe361372c] Successfully loaded platform independent plugin aws:softwareInventory Sep 13 00:46:30.719287 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO [instanceID=i-0bfc46ebbe361372c] Successfully loaded platform independent plugin aws:runPowerShellScript Sep 13 00:46:30.719287 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO [instanceID=i-0bfc46ebbe361372c] Successfully loaded platform independent plugin aws:configureDocker Sep 13 00:46:30.719287 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO [instanceID=i-0bfc46ebbe361372c] Successfully loaded platform independent plugin aws:runDockerAction Sep 13 00:46:30.719287 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO [instanceID=i-0bfc46ebbe361372c] Successfully loaded platform independent plugin aws:configurePackage Sep 13 00:46:30.719287 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO [instanceID=i-0bfc46ebbe361372c] Successfully loaded platform dependent plugin aws:runShellScript Sep 13 00:46:30.719287 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Sep 13 00:46:30.719287 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO OS: linux, Arch: amd64 Sep 13 00:46:30.721876 amazon-ssm-agent[1767]: datastore file /var/lib/amazon/ssm/i-0bfc46ebbe361372c/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Sep 13 00:46:30.722943 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO [HealthCheck] HealthCheck reporting agent health. Sep 13 00:46:30.822675 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO [MessagingDeliveryService] Starting document processing engine... Sep 13 00:46:30.917054 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO [MessagingDeliveryService] [EngineProcessor] Starting Sep 13 00:46:31.011422 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Sep 13 00:46:31.106118 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO [MessagingDeliveryService] Starting message polling Sep 13 00:46:31.133354 tar[1723]: linux-amd64/README.md Sep 13 00:46:31.141524 systemd[1]: Finished prepare-helm.service. Sep 13 00:46:31.201121 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO [MessagingDeliveryService] Starting send replies to MDS Sep 13 00:46:31.297450 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO [instanceID=i-0bfc46ebbe361372c] Starting association polling Sep 13 00:46:31.393586 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Sep 13 00:46:31.406469 locksmithd[1797]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Sep 13 00:46:31.489144 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO [MessagingDeliveryService] [Association] Launching response handler Sep 13 00:46:31.584800 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Sep 13 00:46:31.680705 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Sep 13 00:46:31.776847 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Sep 13 00:46:31.873083 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO [MessageGatewayService] Starting session document processing engine... Sep 13 00:46:31.969589 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO [MessageGatewayService] [EngineProcessor] Starting Sep 13 00:46:32.066310 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Sep 13 00:46:32.163211 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-0bfc46ebbe361372c, requestId: 5cabfa22-9cab-4c27-a529-220e6cf423b3 Sep 13 00:46:32.260290 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO [OfflineService] Starting document processing engine... Sep 13 00:46:32.357607 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO [OfflineService] [EngineProcessor] Starting Sep 13 00:46:32.454986 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO [OfflineService] [EngineProcessor] Initial processing Sep 13 00:46:32.525733 systemd[1]: Started kubelet.service. Sep 13 00:46:32.552679 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO [OfflineService] Starting message polling Sep 13 00:46:32.651147 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO [OfflineService] Starting send replies to MDS Sep 13 00:46:32.749242 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO [LongRunningPluginsManager] starting long running plugin manager Sep 13 00:46:32.847489 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Sep 13 00:46:32.945996 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO [MessageGatewayService] listening reply. Sep 13 00:46:33.044600 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Sep 13 00:46:33.143443 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO [StartupProcessor] Executing startup processor tasks Sep 13 00:46:33.197530 sshd_keygen[1736]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Sep 13 00:46:33.220724 systemd[1]: Finished sshd-keygen.service. Sep 13 00:46:33.223124 systemd[1]: Starting issuegen.service... Sep 13 00:46:33.230226 systemd[1]: issuegen.service: Deactivated successfully. Sep 13 00:46:33.230443 systemd[1]: Finished issuegen.service. Sep 13 00:46:33.233268 systemd[1]: Starting systemd-user-sessions.service... Sep 13 00:46:33.241183 systemd[1]: Finished systemd-user-sessions.service. Sep 13 00:46:33.242951 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Sep 13 00:46:33.243955 systemd[1]: Started getty@tty1.service. Sep 13 00:46:33.246844 systemd[1]: Started serial-getty@ttyS0.service. Sep 13 00:46:33.248200 systemd[1]: Reached target getty.target. Sep 13 00:46:33.249233 systemd[1]: Reached target multi-user.target. Sep 13 00:46:33.251874 systemd[1]: Starting systemd-update-utmp-runlevel.service... Sep 13 00:46:33.261068 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Sep 13 00:46:33.261289 systemd[1]: Finished systemd-update-utmp-runlevel.service. Sep 13 00:46:33.261983 systemd[1]: Startup finished in 614ms (kernel) + 6.584s (initrd) + 11.104s (userspace) = 18.303s. Sep 13 00:46:33.342139 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Sep 13 00:46:33.441569 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.8 Sep 13 00:46:33.541259 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0bfc46ebbe361372c?role=subscribe&stream=input Sep 13 00:46:33.641027 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0bfc46ebbe361372c?role=subscribe&stream=input Sep 13 00:46:33.740998 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO [MessageGatewayService] Starting receiving message from control channel Sep 13 00:46:33.841290 amazon-ssm-agent[1767]: 2025-09-13 00:46:30 INFO [MessageGatewayService] [EngineProcessor] Initial processing Sep 13 00:46:34.433097 kubelet[1908]: E0913 00:46:34.433047 1908 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 00:46:34.435020 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 00:46:34.435161 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 00:46:34.435386 systemd[1]: kubelet.service: Consumed 1.243s CPU time. Sep 13 00:46:39.136311 systemd[1]: Created slice system-sshd.slice. Sep 13 00:46:39.137506 systemd[1]: Started sshd@0-172.31.26.227:22-147.75.109.163:34590.service. Sep 13 00:46:39.349956 sshd[1929]: Accepted publickey for core from 147.75.109.163 port 34590 ssh2: RSA SHA256:9zKSfA0UBs4YCbMNRE+jf2SchYlhVPu6zl9tBdI5N0M Sep 13 00:46:39.352843 sshd[1929]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:46:39.366668 systemd[1]: Created slice user-500.slice. Sep 13 00:46:39.368161 systemd[1]: Starting user-runtime-dir@500.service... Sep 13 00:46:39.373658 systemd-logind[1719]: New session 1 of user core. Sep 13 00:46:39.379506 systemd[1]: Finished user-runtime-dir@500.service. Sep 13 00:46:39.381631 systemd[1]: Starting user@500.service... Sep 13 00:46:39.386217 (systemd)[1932]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:46:39.485716 systemd[1932]: Queued start job for default target default.target. Sep 13 00:46:39.486248 systemd[1932]: Reached target paths.target. Sep 13 00:46:39.486271 systemd[1932]: Reached target sockets.target. Sep 13 00:46:39.486284 systemd[1932]: Reached target timers.target. Sep 13 00:46:39.486295 systemd[1932]: Reached target basic.target. Sep 13 00:46:39.486410 systemd[1]: Started user@500.service. Sep 13 00:46:39.487286 systemd[1]: Started session-1.scope. Sep 13 00:46:39.487663 systemd[1932]: Reached target default.target. Sep 13 00:46:39.487795 systemd[1932]: Startup finished in 94ms. Sep 13 00:46:39.627205 systemd[1]: Started sshd@1-172.31.26.227:22-147.75.109.163:34604.service. Sep 13 00:46:39.790270 sshd[1941]: Accepted publickey for core from 147.75.109.163 port 34604 ssh2: RSA SHA256:9zKSfA0UBs4YCbMNRE+jf2SchYlhVPu6zl9tBdI5N0M Sep 13 00:46:39.791993 sshd[1941]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:46:39.796611 systemd-logind[1719]: New session 2 of user core. Sep 13 00:46:39.797364 systemd[1]: Started session-2.scope. Sep 13 00:46:39.925981 sshd[1941]: pam_unix(sshd:session): session closed for user core Sep 13 00:46:39.928718 systemd[1]: sshd@1-172.31.26.227:22-147.75.109.163:34604.service: Deactivated successfully. Sep 13 00:46:39.929421 systemd[1]: session-2.scope: Deactivated successfully. Sep 13 00:46:39.929919 systemd-logind[1719]: Session 2 logged out. Waiting for processes to exit. Sep 13 00:46:39.931395 systemd-logind[1719]: Removed session 2. Sep 13 00:46:39.952334 systemd[1]: Started sshd@2-172.31.26.227:22-147.75.109.163:48148.service. Sep 13 00:46:40.118155 sshd[1947]: Accepted publickey for core from 147.75.109.163 port 48148 ssh2: RSA SHA256:9zKSfA0UBs4YCbMNRE+jf2SchYlhVPu6zl9tBdI5N0M Sep 13 00:46:40.119643 sshd[1947]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:46:40.125178 systemd-logind[1719]: New session 3 of user core. Sep 13 00:46:40.125824 systemd[1]: Started session-3.scope. Sep 13 00:46:40.251135 sshd[1947]: pam_unix(sshd:session): session closed for user core Sep 13 00:46:40.254338 systemd[1]: sshd@2-172.31.26.227:22-147.75.109.163:48148.service: Deactivated successfully. Sep 13 00:46:40.255366 systemd[1]: session-3.scope: Deactivated successfully. Sep 13 00:46:40.256193 systemd-logind[1719]: Session 3 logged out. Waiting for processes to exit. Sep 13 00:46:40.257243 systemd-logind[1719]: Removed session 3. Sep 13 00:46:40.275810 systemd[1]: Started sshd@3-172.31.26.227:22-147.75.109.163:48152.service. Sep 13 00:46:40.437678 sshd[1953]: Accepted publickey for core from 147.75.109.163 port 48152 ssh2: RSA SHA256:9zKSfA0UBs4YCbMNRE+jf2SchYlhVPu6zl9tBdI5N0M Sep 13 00:46:40.439454 sshd[1953]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:46:40.444120 systemd-logind[1719]: New session 4 of user core. Sep 13 00:46:40.445265 systemd[1]: Started session-4.scope. Sep 13 00:46:40.573538 sshd[1953]: pam_unix(sshd:session): session closed for user core Sep 13 00:46:40.576922 systemd[1]: sshd@3-172.31.26.227:22-147.75.109.163:48152.service: Deactivated successfully. Sep 13 00:46:40.577801 systemd[1]: session-4.scope: Deactivated successfully. Sep 13 00:46:40.578466 systemd-logind[1719]: Session 4 logged out. Waiting for processes to exit. Sep 13 00:46:40.579386 systemd-logind[1719]: Removed session 4. Sep 13 00:46:40.598886 systemd[1]: Started sshd@4-172.31.26.227:22-147.75.109.163:48156.service. Sep 13 00:46:40.721247 amazon-ssm-agent[1767]: 2025-09-13 00:46:40 INFO [HealthCheck] HealthCheck reporting agent health. Sep 13 00:46:40.759208 sshd[1959]: Accepted publickey for core from 147.75.109.163 port 48156 ssh2: RSA SHA256:9zKSfA0UBs4YCbMNRE+jf2SchYlhVPu6zl9tBdI5N0M Sep 13 00:46:40.760871 sshd[1959]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:46:40.766488 systemd[1]: Started session-5.scope. Sep 13 00:46:40.767181 systemd-logind[1719]: New session 5 of user core. Sep 13 00:46:40.893323 sudo[1963]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Sep 13 00:46:40.893593 sudo[1963]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:46:40.901917 dbus-daemon[1712]: \xd0\u001dlK\u0019V: received setenforce notice (enforcing=-1901526656) Sep 13 00:46:40.904280 sudo[1963]: pam_unix(sudo:session): session closed for user root Sep 13 00:46:40.928446 sshd[1959]: pam_unix(sshd:session): session closed for user core Sep 13 00:46:40.931522 systemd[1]: sshd@4-172.31.26.227:22-147.75.109.163:48156.service: Deactivated successfully. Sep 13 00:46:40.932504 systemd[1]: session-5.scope: Deactivated successfully. Sep 13 00:46:40.933137 systemd-logind[1719]: Session 5 logged out. Waiting for processes to exit. Sep 13 00:46:40.935010 systemd-logind[1719]: Removed session 5. Sep 13 00:46:40.954528 systemd[1]: Started sshd@5-172.31.26.227:22-147.75.109.163:48162.service. Sep 13 00:46:41.118423 sshd[1967]: Accepted publickey for core from 147.75.109.163 port 48162 ssh2: RSA SHA256:9zKSfA0UBs4YCbMNRE+jf2SchYlhVPu6zl9tBdI5N0M Sep 13 00:46:41.120015 sshd[1967]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:46:41.125701 systemd[1]: Started session-6.scope. Sep 13 00:46:41.126222 systemd-logind[1719]: New session 6 of user core. Sep 13 00:46:41.231315 sudo[1971]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Sep 13 00:46:41.231662 sudo[1971]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:46:41.234968 sudo[1971]: pam_unix(sudo:session): session closed for user root Sep 13 00:46:41.240480 sudo[1970]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Sep 13 00:46:41.240825 sudo[1970]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:46:41.251354 systemd[1]: Stopping audit-rules.service... Sep 13 00:46:41.257581 kernel: kauditd_printk_skb: 227 callbacks suppressed Sep 13 00:46:41.257715 kernel: audit: type=1305 audit(1757724401.253:205): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 13 00:46:41.257752 kernel: audit: type=1300 audit(1757724401.253:205): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe2a5d8db0 a2=420 a3=0 items=0 ppid=1 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:41.253000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 13 00:46:41.253000 audit[1974]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe2a5d8db0 a2=420 a3=0 items=0 ppid=1 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:41.262506 auditctl[1974]: No rules Sep 13 00:46:41.253000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Sep 13 00:46:41.268868 kernel: audit: type=1327 audit(1757724401.253:205): proctitle=2F7362696E2F617564697463746C002D44 Sep 13 00:46:41.268984 kernel: audit: type=1131 audit(1757724401.262:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:41.262000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:41.263401 systemd[1]: audit-rules.service: Deactivated successfully. Sep 13 00:46:41.263633 systemd[1]: Stopped audit-rules.service. Sep 13 00:46:41.270152 systemd[1]: Starting audit-rules.service... Sep 13 00:46:41.290728 augenrules[1991]: No rules Sep 13 00:46:41.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:41.293085 sudo[1970]: pam_unix(sudo:session): session closed for user root Sep 13 00:46:41.291641 systemd[1]: Finished audit-rules.service. Sep 13 00:46:41.291000 audit[1970]: USER_END pid=1970 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:46:41.300531 kernel: audit: type=1130 audit(1757724401.291:207): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:41.300624 kernel: audit: type=1106 audit(1757724401.291:208): pid=1970 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:46:41.300651 kernel: audit: type=1104 audit(1757724401.291:209): pid=1970 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:46:41.291000 audit[1970]: CRED_DISP pid=1970 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:46:41.316507 sshd[1967]: pam_unix(sshd:session): session closed for user core Sep 13 00:46:41.316000 audit[1967]: USER_END pid=1967 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:46:41.318970 systemd[1]: sshd@5-172.31.26.227:22-147.75.109.163:48162.service: Deactivated successfully. Sep 13 00:46:41.320502 systemd[1]: session-6.scope: Deactivated successfully. Sep 13 00:46:41.321836 systemd-logind[1719]: Session 6 logged out. Waiting for processes to exit. Sep 13 00:46:41.317000 audit[1967]: CRED_DISP pid=1967 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:46:41.322845 systemd-logind[1719]: Removed session 6. Sep 13 00:46:41.327177 kernel: audit: type=1106 audit(1757724401.316:210): pid=1967 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:46:41.327277 kernel: audit: type=1104 audit(1757724401.317:211): pid=1967 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:46:41.327300 kernel: audit: type=1131 audit(1757724401.318:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.26.227:22-147.75.109.163:48162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:41.318000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.26.227:22-147.75.109.163:48162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:41.342062 systemd[1]: Started sshd@6-172.31.26.227:22-147.75.109.163:48170.service. Sep 13 00:46:41.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.26.227:22-147.75.109.163:48170 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:41.503000 audit[1997]: USER_ACCT pid=1997 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:46:41.505393 sshd[1997]: Accepted publickey for core from 147.75.109.163 port 48170 ssh2: RSA SHA256:9zKSfA0UBs4YCbMNRE+jf2SchYlhVPu6zl9tBdI5N0M Sep 13 00:46:41.505000 audit[1997]: CRED_ACQ pid=1997 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:46:41.505000 audit[1997]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb9a73210 a2=3 a3=0 items=0 ppid=1 pid=1997 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:41.505000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:46:41.506282 sshd[1997]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:46:41.512113 systemd[1]: Started session-7.scope. Sep 13 00:46:41.512504 systemd-logind[1719]: New session 7 of user core. Sep 13 00:46:41.518000 audit[1997]: USER_START pid=1997 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:46:41.519000 audit[1999]: CRED_ACQ pid=1999 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:46:41.616000 audit[2000]: USER_ACCT pid=2000 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:46:41.616744 sudo[2000]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Sep 13 00:46:41.616000 audit[2000]: CRED_REFR pid=2000 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:46:41.617080 sudo[2000]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:46:41.618000 audit[2000]: USER_START pid=2000 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:46:41.644210 systemd[1]: Starting docker.service... Sep 13 00:46:41.683115 env[2010]: time="2025-09-13T00:46:41.683064228Z" level=info msg="Starting up" Sep 13 00:46:41.686281 env[2010]: time="2025-09-13T00:46:41.686235009Z" level=info msg="parsed scheme: \"unix\"" module=grpc Sep 13 00:46:41.686281 env[2010]: time="2025-09-13T00:46:41.686268451Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Sep 13 00:46:41.686460 env[2010]: time="2025-09-13T00:46:41.686295859Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Sep 13 00:46:41.686460 env[2010]: time="2025-09-13T00:46:41.686315154Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Sep 13 00:46:41.689019 env[2010]: time="2025-09-13T00:46:41.688974945Z" level=info msg="parsed scheme: \"unix\"" module=grpc Sep 13 00:46:41.689019 env[2010]: time="2025-09-13T00:46:41.689004333Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Sep 13 00:46:41.689183 env[2010]: time="2025-09-13T00:46:41.689028509Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Sep 13 00:46:41.689183 env[2010]: time="2025-09-13T00:46:41.689045321Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Sep 13 00:46:41.698017 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport3208603958-merged.mount: Deactivated successfully. Sep 13 00:46:41.786788 env[2010]: time="2025-09-13T00:46:41.785761936Z" level=info msg="Loading containers: start." Sep 13 00:46:41.906000 audit[2041]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=2041 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:41.906000 audit[2041]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffd09c73910 a2=0 a3=7ffd09c738fc items=0 ppid=2010 pid=2041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:41.906000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Sep 13 00:46:41.909000 audit[2043]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2043 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:41.909000 audit[2043]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff916e7890 a2=0 a3=7fff916e787c items=0 ppid=2010 pid=2043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:41.909000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Sep 13 00:46:41.911000 audit[2045]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=2045 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:41.911000 audit[2045]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff46b266b0 a2=0 a3=7fff46b2669c items=0 ppid=2010 pid=2045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:41.911000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Sep 13 00:46:41.914000 audit[2047]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=2047 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:41.914000 audit[2047]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fffc9050b30 a2=0 a3=7fffc9050b1c items=0 ppid=2010 pid=2047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:41.914000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Sep 13 00:46:41.925000 audit[2049]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2049 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:41.925000 audit[2049]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc7bc419e0 a2=0 a3=7ffc7bc419cc items=0 ppid=2010 pid=2049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:41.925000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Sep 13 00:46:41.945000 audit[2054]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=2054 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:41.945000 audit[2054]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe5f0d4d40 a2=0 a3=7ffe5f0d4d2c items=0 ppid=2010 pid=2054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:41.945000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Sep 13 00:46:41.960000 audit[2056]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=2056 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:41.960000 audit[2056]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd55ba8290 a2=0 a3=7ffd55ba827c items=0 ppid=2010 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:41.960000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Sep 13 00:46:41.963000 audit[2058]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=2058 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:41.963000 audit[2058]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffc87c56e70 a2=0 a3=7ffc87c56e5c items=0 ppid=2010 pid=2058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:41.963000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Sep 13 00:46:41.965000 audit[2060]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=2060 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:41.965000 audit[2060]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffc3fe28210 a2=0 a3=7ffc3fe281fc items=0 ppid=2010 pid=2060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:41.965000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Sep 13 00:46:41.980000 audit[2064]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=2064 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:41.980000 audit[2064]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffcf64437c0 a2=0 a3=7ffcf64437ac items=0 ppid=2010 pid=2064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:41.980000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Sep 13 00:46:41.986000 audit[2065]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=2065 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:41.986000 audit[2065]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc3ff707d0 a2=0 a3=7ffc3ff707bc items=0 ppid=2010 pid=2065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:41.986000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Sep 13 00:46:42.013578 kernel: Initializing XFRM netlink socket Sep 13 00:46:42.076458 env[2010]: time="2025-09-13T00:46:42.074933101Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Sep 13 00:46:42.077441 (udev-worker)[2021]: Network interface NamePolicy= disabled on kernel command line. Sep 13 00:46:42.118000 audit[2073]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=2073 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:42.118000 audit[2073]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffcdd4193e0 a2=0 a3=7ffcdd4193cc items=0 ppid=2010 pid=2073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:42.118000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Sep 13 00:46:42.130000 audit[2076]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=2076 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:42.130000 audit[2076]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffda67586f0 a2=0 a3=7ffda67586dc items=0 ppid=2010 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:42.130000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Sep 13 00:46:42.134000 audit[2079]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=2079 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:42.134000 audit[2079]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd4a84d840 a2=0 a3=7ffd4a84d82c items=0 ppid=2010 pid=2079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:42.134000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Sep 13 00:46:42.137000 audit[2081]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=2081 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:42.137000 audit[2081]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe3b4ce1c0 a2=0 a3=7ffe3b4ce1ac items=0 ppid=2010 pid=2081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:42.137000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Sep 13 00:46:42.139000 audit[2083]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=2083 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:42.139000 audit[2083]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffe8e038e20 a2=0 a3=7ffe8e038e0c items=0 ppid=2010 pid=2083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:42.139000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Sep 13 00:46:42.142000 audit[2085]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=2085 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:42.142000 audit[2085]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffc2ea8b810 a2=0 a3=7ffc2ea8b7fc items=0 ppid=2010 pid=2085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:42.142000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Sep 13 00:46:42.144000 audit[2087]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=2087 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:42.144000 audit[2087]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffecb748cd0 a2=0 a3=7ffecb748cbc items=0 ppid=2010 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:42.144000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Sep 13 00:46:42.165000 audit[2090]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=2090 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:42.165000 audit[2090]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffc9dcaa750 a2=0 a3=7ffc9dcaa73c items=0 ppid=2010 pid=2090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:42.165000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Sep 13 00:46:42.168000 audit[2092]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2092 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:42.168000 audit[2092]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffd1d004960 a2=0 a3=7ffd1d00494c items=0 ppid=2010 pid=2092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:42.168000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Sep 13 00:46:42.171000 audit[2094]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=2094 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:42.171000 audit[2094]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffefe552fc0 a2=0 a3=7ffefe552fac items=0 ppid=2010 pid=2094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:42.171000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Sep 13 00:46:42.174000 audit[2096]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=2096 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:42.174000 audit[2096]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc648477b0 a2=0 a3=7ffc6484779c items=0 ppid=2010 pid=2096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:42.174000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Sep 13 00:46:42.175363 systemd-networkd[1456]: docker0: Link UP Sep 13 00:46:42.191000 audit[2100]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=2100 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:42.191000 audit[2100]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff863d8cb0 a2=0 a3=7fff863d8c9c items=0 ppid=2010 pid=2100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:42.191000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Sep 13 00:46:42.197000 audit[2101]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=2101 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:46:42.197000 audit[2101]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc22e0c9a0 a2=0 a3=7ffc22e0c98c items=0 ppid=2010 pid=2101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:46:42.197000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Sep 13 00:46:42.198453 env[2010]: time="2025-09-13T00:46:42.198415730Z" level=info msg="Loading containers: done." Sep 13 00:46:42.212762 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck3159359065-merged.mount: Deactivated successfully. Sep 13 00:46:42.237457 env[2010]: time="2025-09-13T00:46:42.237403477Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Sep 13 00:46:42.237752 env[2010]: time="2025-09-13T00:46:42.237721786Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Sep 13 00:46:42.237883 env[2010]: time="2025-09-13T00:46:42.237856863Z" level=info msg="Daemon has completed initialization" Sep 13 00:46:42.266431 systemd[1]: Started docker.service. Sep 13 00:46:42.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:42.273354 env[2010]: time="2025-09-13T00:46:42.273288866Z" level=info msg="API listen on /run/docker.sock" Sep 13 00:46:43.674947 env[1726]: time="2025-09-13T00:46:43.674893282Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.9\"" Sep 13 00:46:44.267432 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount515903356.mount: Deactivated successfully. Sep 13 00:46:44.595732 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Sep 13 00:46:44.596006 systemd[1]: Stopped kubelet.service. Sep 13 00:46:44.596062 systemd[1]: kubelet.service: Consumed 1.243s CPU time. Sep 13 00:46:44.595000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:44.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:44.597530 systemd[1]: Starting kubelet.service... Sep 13 00:46:44.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:44.822082 systemd[1]: Started kubelet.service. Sep 13 00:46:44.881464 kubelet[2138]: E0913 00:46:44.881360 2138 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 00:46:44.884915 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 00:46:44.885054 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 00:46:44.884000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 13 00:46:44.917504 amazon-ssm-agent[1767]: 2025-09-13 00:46:44 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Sep 13 00:46:46.453353 env[1726]: time="2025-09-13T00:46:46.453288418Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:46.457750 env[1726]: time="2025-09-13T00:46:46.457697177Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:abd2b525baf428ffb8b8b7d1e09761dc5cdb7ed0c7896a9427e29e84f8eafc59,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:46.461115 env[1726]: time="2025-09-13T00:46:46.461069819Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:46.464489 env[1726]: time="2025-09-13T00:46:46.464441438Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:6df11cc2ad9679b1117be34d3a0230add88bc0a08fd7a3ebc26b680575e8de97,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:46.465421 env[1726]: time="2025-09-13T00:46:46.465377393Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.9\" returns image reference \"sha256:abd2b525baf428ffb8b8b7d1e09761dc5cdb7ed0c7896a9427e29e84f8eafc59\"" Sep 13 00:46:46.466168 env[1726]: time="2025-09-13T00:46:46.466144388Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.9\"" Sep 13 00:46:48.781243 env[1726]: time="2025-09-13T00:46:48.781188754Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:48.785854 env[1726]: time="2025-09-13T00:46:48.785809110Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0debe32fbb7223500fcf8c312f2a568a5abd3ed9274d8ec6780cfb30b8861e91,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:48.788934 env[1726]: time="2025-09-13T00:46:48.788889872Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:48.792092 env[1726]: time="2025-09-13T00:46:48.792048940Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:243c4b8e3bce271fcb1b78008ab996ab6976b1a20096deac08338fcd17979922,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:48.792811 env[1726]: time="2025-09-13T00:46:48.792773984Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.9\" returns image reference \"sha256:0debe32fbb7223500fcf8c312f2a568a5abd3ed9274d8ec6780cfb30b8861e91\"" Sep 13 00:46:48.793616 env[1726]: time="2025-09-13T00:46:48.793590419Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.9\"" Sep 13 00:46:50.841348 env[1726]: time="2025-09-13T00:46:50.841293603Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:50.850110 env[1726]: time="2025-09-13T00:46:50.850055162Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6934c23b154fcb9bf54ed5913782de746735a49f4daa4732285915050cd44ad5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:50.853577 env[1726]: time="2025-09-13T00:46:50.853529659Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:50.856495 env[1726]: time="2025-09-13T00:46:50.856448358Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:50c49520dbd0e8b4076b6a5c77d8014df09ea3d59a73e8bafd2678d51ebb92d5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:50.857401 env[1726]: time="2025-09-13T00:46:50.857334062Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.9\" returns image reference \"sha256:6934c23b154fcb9bf54ed5913782de746735a49f4daa4732285915050cd44ad5\"" Sep 13 00:46:50.858094 env[1726]: time="2025-09-13T00:46:50.858073407Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.9\"" Sep 13 00:46:52.238277 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2306811794.mount: Deactivated successfully. Sep 13 00:46:52.926812 env[1726]: time="2025-09-13T00:46:52.926753688Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:52.931132 env[1726]: time="2025-09-13T00:46:52.931090196Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fa3fdca615a501743d8deb39729a96e731312aac8d96accec061d5265360332f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:52.934832 env[1726]: time="2025-09-13T00:46:52.934784199Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:52.937585 env[1726]: time="2025-09-13T00:46:52.937516961Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:886af02535dc34886e4618b902f8c140d89af57233a245621d29642224516064,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:52.938136 env[1726]: time="2025-09-13T00:46:52.938105856Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.9\" returns image reference \"sha256:fa3fdca615a501743d8deb39729a96e731312aac8d96accec061d5265360332f\"" Sep 13 00:46:52.938752 env[1726]: time="2025-09-13T00:46:52.938723178Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\"" Sep 13 00:46:53.452473 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3024572009.mount: Deactivated successfully. Sep 13 00:46:54.585719 env[1726]: time="2025-09-13T00:46:54.585635593Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:54.588808 env[1726]: time="2025-09-13T00:46:54.588757675Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:54.596435 env[1726]: time="2025-09-13T00:46:54.596386550Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:54.598160 env[1726]: time="2025-09-13T00:46:54.598121286Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:9caabbf6238b189a65d0d6e6ac138de60d6a1c419e5a341fbbb7c78382559c6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:54.598894 env[1726]: time="2025-09-13T00:46:54.598854361Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\" returns image reference \"sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6\"" Sep 13 00:46:54.599629 env[1726]: time="2025-09-13T00:46:54.599600939Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" Sep 13 00:46:55.051062 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Sep 13 00:46:55.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:55.051269 systemd[1]: Stopped kubelet.service. Sep 13 00:46:55.069266 kernel: kauditd_printk_skb: 88 callbacks suppressed Sep 13 00:46:55.069406 kernel: audit: type=1130 audit(1757724415.050:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:55.069453 kernel: audit: type=1131 audit(1757724415.052:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:55.052000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:55.061421 systemd[1]: Starting kubelet.service... Sep 13 00:46:55.063711 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount217588784.mount: Deactivated successfully. Sep 13 00:46:55.100364 env[1726]: time="2025-09-13T00:46:55.100307177Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:55.109829 env[1726]: time="2025-09-13T00:46:55.109782784Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:55.113581 env[1726]: time="2025-09-13T00:46:55.113444766Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:55.119251 env[1726]: time="2025-09-13T00:46:55.119206248Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:55.120795 env[1726]: time="2025-09-13T00:46:55.120753187Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" Sep 13 00:46:55.122113 env[1726]: time="2025-09-13T00:46:55.121945251Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\"" Sep 13 00:46:55.274192 systemd[1]: Started kubelet.service. Sep 13 00:46:55.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:55.278592 kernel: audit: type=1130 audit(1757724415.273:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:46:55.320686 kubelet[2147]: E0913 00:46:55.320035 2147 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 00:46:55.322401 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 00:46:55.322593 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 00:46:55.322000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 13 00:46:55.327571 kernel: audit: type=1131 audit(1757724415.322:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 13 00:46:55.674471 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2132098288.mount: Deactivated successfully. Sep 13 00:46:58.013642 env[1726]: time="2025-09-13T00:46:58.013590738Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:58.018040 env[1726]: time="2025-09-13T00:46:58.017992540Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:58.022965 env[1726]: time="2025-09-13T00:46:58.021537305Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:58.026485 env[1726]: time="2025-09-13T00:46:58.026439105Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:c6a9d11cc5c04b114ccdef39a9265eeef818e3d02f5359be035ae784097fdec5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:46:58.027486 env[1726]: time="2025-09-13T00:46:58.027444101Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\" returns image reference \"sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc\"" Sep 13 00:47:00.257359 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Sep 13 00:47:00.257000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:47:00.264146 kernel: audit: type=1131 audit(1757724420.257:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:47:00.280000 audit: BPF prog-id=43 op=UNLOAD Sep 13 00:47:00.280000 audit: BPF prog-id=42 op=UNLOAD Sep 13 00:47:00.283496 kernel: audit: type=1334 audit(1757724420.280:256): prog-id=43 op=UNLOAD Sep 13 00:47:00.283570 kernel: audit: type=1334 audit(1757724420.280:257): prog-id=42 op=UNLOAD Sep 13 00:47:00.283645 kernel: audit: type=1334 audit(1757724420.280:258): prog-id=41 op=UNLOAD Sep 13 00:47:00.280000 audit: BPF prog-id=41 op=UNLOAD Sep 13 00:47:00.575706 systemd[1]: Stopped kubelet.service. Sep 13 00:47:00.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:47:00.583935 kernel: audit: type=1130 audit(1757724420.575:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:47:00.584066 kernel: audit: type=1131 audit(1757724420.578:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:47:00.578000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:47:00.585291 systemd[1]: Starting kubelet.service... Sep 13 00:47:00.620114 systemd[1]: Reloading. Sep 13 00:47:00.727301 /usr/lib/systemd/system-generators/torcx-generator[2201]: time="2025-09-13T00:47:00Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 00:47:00.732664 /usr/lib/systemd/system-generators/torcx-generator[2201]: time="2025-09-13T00:47:00Z" level=info msg="torcx already run" Sep 13 00:47:00.877241 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 00:47:00.877454 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 00:47:00.904265 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 00:47:01.012606 kernel: audit: type=1400 audit(1757724421.001:261): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.012760 kernel: audit: type=1400 audit(1757724421.001:262): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.022568 kernel: audit: type=1400 audit(1757724421.001:263): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.030773 kernel: audit: type=1400 audit(1757724421.001:264): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.005000 audit: BPF prog-id=46 op=LOAD Sep 13 00:47:01.005000 audit: BPF prog-id=36 op=UNLOAD Sep 13 00:47:01.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.012000 audit: BPF prog-id=47 op=LOAD Sep 13 00:47:01.012000 audit: BPF prog-id=27 op=UNLOAD Sep 13 00:47:01.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.012000 audit: BPF prog-id=48 op=LOAD Sep 13 00:47:01.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.012000 audit: BPF prog-id=49 op=LOAD Sep 13 00:47:01.012000 audit: BPF prog-id=28 op=UNLOAD Sep 13 00:47:01.012000 audit: BPF prog-id=29 op=UNLOAD Sep 13 00:47:01.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.014000 audit: BPF prog-id=50 op=LOAD Sep 13 00:47:01.014000 audit: BPF prog-id=44 op=UNLOAD Sep 13 00:47:01.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.029000 audit: BPF prog-id=51 op=LOAD Sep 13 00:47:01.029000 audit: BPF prog-id=30 op=UNLOAD Sep 13 00:47:01.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.035000 audit: BPF prog-id=58 op=LOAD Sep 13 00:47:01.035000 audit: BPF prog-id=38 op=UNLOAD Sep 13 00:47:01.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:01.058055 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Sep 13 00:47:01.058162 systemd[1]: kubelet.service: Failed with result 'signal'. Sep 13 00:47:01.058589 systemd[1]: Stopped kubelet.service. Sep 13 00:47:01.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 13 00:47:01.061335 systemd[1]: Starting kubelet.service... Sep 13 00:47:01.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:47:01.901988 systemd[1]: Started kubelet.service. Sep 13 00:47:02.258373 kubelet[2258]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 13 00:47:02.258373 kubelet[2258]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Sep 13 00:47:02.258373 kubelet[2258]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 13 00:47:02.258373 kubelet[2258]: I0913 00:47:02.258011 2258 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Sep 13 00:47:02.745029 kubelet[2258]: I0913 00:47:02.744979 2258 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" Sep 13 00:47:02.751984 kubelet[2258]: I0913 00:47:02.751943 2258 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Sep 13 00:47:02.754383 kubelet[2258]: I0913 00:47:02.754347 2258 server.go:954] "Client rotation is on, will bootstrap in background" Sep 13 00:47:02.905012 kubelet[2258]: E0913 00:47:02.904966 2258 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://172.31.26.227:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 172.31.26.227:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:47:02.908845 kubelet[2258]: I0913 00:47:02.908803 2258 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Sep 13 00:47:02.937176 kubelet[2258]: E0913 00:47:02.937123 2258 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Sep 13 00:47:02.937176 kubelet[2258]: I0913 00:47:02.937167 2258 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Sep 13 00:47:02.944781 kubelet[2258]: I0913 00:47:02.940266 2258 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Sep 13 00:47:02.944781 kubelet[2258]: I0913 00:47:02.942233 2258 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Sep 13 00:47:02.944781 kubelet[2258]: I0913 00:47:02.942279 2258 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ip-172-31-26-227","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Sep 13 00:47:02.944781 kubelet[2258]: I0913 00:47:02.943708 2258 topology_manager.go:138] "Creating topology manager with none policy" Sep 13 00:47:02.945182 kubelet[2258]: I0913 00:47:02.943728 2258 container_manager_linux.go:304] "Creating device plugin manager" Sep 13 00:47:02.945182 kubelet[2258]: I0913 00:47:02.943888 2258 state_mem.go:36] "Initialized new in-memory state store" Sep 13 00:47:02.953905 kubelet[2258]: I0913 00:47:02.953863 2258 kubelet.go:446] "Attempting to sync node with API server" Sep 13 00:47:02.954686 kubelet[2258]: I0913 00:47:02.954613 2258 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" Sep 13 00:47:02.954797 kubelet[2258]: I0913 00:47:02.954692 2258 kubelet.go:352] "Adding apiserver pod source" Sep 13 00:47:02.954797 kubelet[2258]: I0913 00:47:02.954709 2258 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Sep 13 00:47:02.962956 kubelet[2258]: W0913 00:47:02.962883 2258 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.31.26.227:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-26-227&limit=500&resourceVersion=0": dial tcp 172.31.26.227:6443: connect: connection refused Sep 13 00:47:02.963258 kubelet[2258]: E0913 00:47:02.962976 2258 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://172.31.26.227:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-26-227&limit=500&resourceVersion=0\": dial tcp 172.31.26.227:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:47:02.967928 kubelet[2258]: W0913 00:47:02.967821 2258 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.31.26.227:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 172.31.26.227:6443: connect: connection refused Sep 13 00:47:02.968209 kubelet[2258]: E0913 00:47:02.968184 2258 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://172.31.26.227:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 172.31.26.227:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:47:02.968448 kubelet[2258]: I0913 00:47:02.968428 2258 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Sep 13 00:47:02.976298 kubelet[2258]: I0913 00:47:02.976260 2258 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Sep 13 00:47:03.011349 kubelet[2258]: W0913 00:47:03.009448 2258 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Sep 13 00:47:03.017448 kubelet[2258]: I0913 00:47:03.017402 2258 watchdog_linux.go:99] "Systemd watchdog is not enabled" Sep 13 00:47:03.017662 kubelet[2258]: I0913 00:47:03.017488 2258 server.go:1287] "Started kubelet" Sep 13 00:47:03.045000 audit[2258]: AVC avc: denied { mac_admin } for pid=2258 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:03.045000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:47:03.045000 audit[2258]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a193b0 a1=c0006977e8 a2=c000a19380 a3=25 items=0 ppid=1 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:03.045000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:47:03.046867 kubelet[2258]: I0913 00:47:03.046837 2258 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Sep 13 00:47:03.046000 audit[2258]: AVC avc: denied { mac_admin } for pid=2258 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:03.046000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:47:03.046000 audit[2258]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000699580 a1=c000697800 a2=c000a19440 a3=25 items=0 ppid=1 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:03.046000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:47:03.047255 kubelet[2258]: I0913 00:47:03.047237 2258 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Sep 13 00:47:03.047427 kubelet[2258]: I0913 00:47:03.047415 2258 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Sep 13 00:47:03.048646 kubelet[2258]: I0913 00:47:03.048611 2258 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 Sep 13 00:47:03.052595 kubelet[2258]: I0913 00:47:03.052539 2258 server.go:479] "Adding debug handlers to kubelet server" Sep 13 00:47:03.056340 kubelet[2258]: I0913 00:47:03.056279 2258 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Sep 13 00:47:03.058403 kubelet[2258]: E0913 00:47:03.056277 2258 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://172.31.26.227:6443/api/v1/namespaces/default/events\": dial tcp 172.31.26.227:6443: connect: connection refused" event="&Event{ObjectMeta:{ip-172-31-26-227.1864b10cc6fb9284 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ip-172-31-26-227,UID:ip-172-31-26-227,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ip-172-31-26-227,},FirstTimestamp:2025-09-13 00:47:03.01743578 +0000 UTC m=+1.052228361,LastTimestamp:2025-09-13 00:47:03.01743578 +0000 UTC m=+1.052228361,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ip-172-31-26-227,}" Sep 13 00:47:03.059419 kubelet[2258]: I0913 00:47:03.059394 2258 volume_manager.go:297] "Starting Kubelet Volume Manager" Sep 13 00:47:03.059730 kubelet[2258]: E0913 00:47:03.059706 2258 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ip-172-31-26-227\" not found" Sep 13 00:47:03.060335 kubelet[2258]: I0913 00:47:03.060311 2258 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Sep 13 00:47:03.060453 kubelet[2258]: I0913 00:47:03.060367 2258 reconciler.go:26] "Reconciler: start to sync state" Sep 13 00:47:03.060713 kubelet[2258]: I0913 00:47:03.060659 2258 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Sep 13 00:47:03.062226 kubelet[2258]: I0913 00:47:03.062197 2258 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Sep 13 00:47:03.063947 kubelet[2258]: W0913 00:47:03.063500 2258 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://172.31.26.227:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.26.227:6443: connect: connection refused Sep 13 00:47:03.063947 kubelet[2258]: E0913 00:47:03.063579 2258 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://172.31.26.227:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 172.31.26.227:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:47:03.063947 kubelet[2258]: E0913 00:47:03.063662 2258 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.26.227:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-26-227?timeout=10s\": dial tcp 172.31.26.227:6443: connect: connection refused" interval="200ms" Sep 13 00:47:03.063947 kubelet[2258]: I0913 00:47:03.063893 2258 factory.go:221] Registration of the systemd container factory successfully Sep 13 00:47:03.064265 kubelet[2258]: I0913 00:47:03.063991 2258 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Sep 13 00:47:03.065862 kubelet[2258]: I0913 00:47:03.065672 2258 factory.go:221] Registration of the containerd container factory successfully Sep 13 00:47:03.072000 audit[2270]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2270 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:47:03.072000 audit[2270]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd895061a0 a2=0 a3=7ffd8950618c items=0 ppid=2258 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:03.072000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 13 00:47:03.074000 audit[2271]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2271 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:47:03.074000 audit[2271]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff4807b810 a2=0 a3=7fff4807b7fc items=0 ppid=2258 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:03.074000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 13 00:47:03.077000 audit[2273]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2273 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:47:03.077000 audit[2273]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcf4f30790 a2=0 a3=7ffcf4f3077c items=0 ppid=2258 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:03.077000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:47:03.080000 audit[2275]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2275 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:47:03.080000 audit[2275]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcab8ceeb0 a2=0 a3=7ffcab8cee9c items=0 ppid=2258 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:03.080000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:47:03.091389 kubelet[2258]: E0913 00:47:03.091355 2258 kubelet.go:1555] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Sep 13 00:47:03.103000 audit[2280]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2280 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:47:03.103000 audit[2280]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd4cbb25a0 a2=0 a3=7ffd4cbb258c items=0 ppid=2258 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:03.103000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Sep 13 00:47:03.107771 kubelet[2258]: I0913 00:47:03.107727 2258 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Sep 13 00:47:03.109000 audit[2282]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=2282 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:47:03.109000 audit[2282]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffc057fdf0 a2=0 a3=7fffc057fddc items=0 ppid=2258 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:03.109000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 13 00:47:03.110909 kubelet[2258]: I0913 00:47:03.110885 2258 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Sep 13 00:47:03.111047 kubelet[2258]: I0913 00:47:03.111037 2258 status_manager.go:227] "Starting to sync pod status with apiserver" Sep 13 00:47:03.111130 kubelet[2258]: I0913 00:47:03.111120 2258 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Sep 13 00:47:03.111201 kubelet[2258]: I0913 00:47:03.111193 2258 kubelet.go:2382] "Starting kubelet main sync loop" Sep 13 00:47:03.111330 kubelet[2258]: E0913 00:47:03.111311 2258 kubelet.go:2406] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Sep 13 00:47:03.112000 audit[2283]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=2283 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:47:03.112000 audit[2283]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd49f4cad0 a2=0 a3=7ffd49f4cabc items=0 ppid=2258 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:03.112000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 13 00:47:03.114000 audit[2284]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=2284 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:47:03.114000 audit[2284]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd75edc6a0 a2=0 a3=7ffd75edc68c items=0 ppid=2258 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:03.114000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 13 00:47:03.116000 audit[2285]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2285 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:47:03.116000 audit[2285]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff30ee0ad0 a2=0 a3=7fff30ee0abc items=0 ppid=2258 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:03.116000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 13 00:47:03.117000 audit[2286]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=2286 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:47:03.117000 audit[2286]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffce13394c0 a2=0 a3=7ffce13394ac items=0 ppid=2258 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:03.117000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 13 00:47:03.119000 audit[2287]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=2287 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:47:03.119000 audit[2287]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe48357fd0 a2=0 a3=7ffe48357fbc items=0 ppid=2258 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:03.119000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 13 00:47:03.120835 kubelet[2258]: I0913 00:47:03.120815 2258 cpu_manager.go:221] "Starting CPU manager" policy="none" Sep 13 00:47:03.120946 kubelet[2258]: I0913 00:47:03.120935 2258 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Sep 13 00:47:03.121022 kubelet[2258]: I0913 00:47:03.121014 2258 state_mem.go:36] "Initialized new in-memory state store" Sep 13 00:47:03.122145 kubelet[2258]: W0913 00:47:03.122086 2258 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://172.31.26.227:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.26.227:6443: connect: connection refused Sep 13 00:47:03.122278 kubelet[2258]: E0913 00:47:03.122164 2258 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://172.31.26.227:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 172.31.26.227:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:47:03.122000 audit[2288]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=2288 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:47:03.122000 audit[2288]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffeff95d090 a2=0 a3=7ffeff95d07c items=0 ppid=2258 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:03.122000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 13 00:47:03.125233 kubelet[2258]: I0913 00:47:03.125214 2258 policy_none.go:49] "None policy: Start" Sep 13 00:47:03.125341 kubelet[2258]: I0913 00:47:03.125332 2258 memory_manager.go:186] "Starting memorymanager" policy="None" Sep 13 00:47:03.125460 kubelet[2258]: I0913 00:47:03.125452 2258 state_mem.go:35] "Initializing new in-memory state store" Sep 13 00:47:03.138826 systemd[1]: Created slice kubepods.slice. Sep 13 00:47:03.144679 systemd[1]: Created slice kubepods-burstable.slice. Sep 13 00:47:03.148942 systemd[1]: Created slice kubepods-besteffort.slice. Sep 13 00:47:03.157911 kubelet[2258]: I0913 00:47:03.157681 2258 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Sep 13 00:47:03.161000 audit[2258]: AVC avc: denied { mac_admin } for pid=2258 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:03.161000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:47:03.175749 kubelet[2258]: E0913 00:47:03.160075 2258 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ip-172-31-26-227\" not found" Sep 13 00:47:03.161000 audit[2258]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000dd15f0 a1=c000dc7f50 a2=c000dd15c0 a3=25 items=0 ppid=1 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:03.161000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:47:03.177242 kubelet[2258]: I0913 00:47:03.177206 2258 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" Sep 13 00:47:03.178282 kubelet[2258]: I0913 00:47:03.178261 2258 eviction_manager.go:189] "Eviction manager: starting control loop" Sep 13 00:47:03.178846 kubelet[2258]: I0913 00:47:03.178692 2258 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Sep 13 00:47:03.185191 kubelet[2258]: I0913 00:47:03.184747 2258 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Sep 13 00:47:03.186068 kubelet[2258]: E0913 00:47:03.186048 2258 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Sep 13 00:47:03.196160 kubelet[2258]: E0913 00:47:03.196138 2258 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ip-172-31-26-227\" not found" Sep 13 00:47:03.243612 systemd[1]: Created slice kubepods-burstable-podfb9475d9934d25937c43a38c589da802.slice. Sep 13 00:47:03.258977 kubelet[2258]: E0913 00:47:03.258941 2258 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-26-227\" not found" node="ip-172-31-26-227" Sep 13 00:47:03.262274 kubelet[2258]: I0913 00:47:03.262154 2258 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/fb9475d9934d25937c43a38c589da802-ca-certs\") pod \"kube-apiserver-ip-172-31-26-227\" (UID: \"fb9475d9934d25937c43a38c589da802\") " pod="kube-system/kube-apiserver-ip-172-31-26-227" Sep 13 00:47:03.262645 kubelet[2258]: I0913 00:47:03.262459 2258 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/fb9475d9934d25937c43a38c589da802-k8s-certs\") pod \"kube-apiserver-ip-172-31-26-227\" (UID: \"fb9475d9934d25937c43a38c589da802\") " pod="kube-system/kube-apiserver-ip-172-31-26-227" Sep 13 00:47:03.262971 kubelet[2258]: I0913 00:47:03.262940 2258 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/fb9475d9934d25937c43a38c589da802-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-26-227\" (UID: \"fb9475d9934d25937c43a38c589da802\") " pod="kube-system/kube-apiserver-ip-172-31-26-227" Sep 13 00:47:03.263215 kubelet[2258]: I0913 00:47:03.263198 2258 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/acf0e14d73602c0720713c384036043f-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-26-227\" (UID: \"acf0e14d73602c0720713c384036043f\") " pod="kube-system/kube-controller-manager-ip-172-31-26-227" Sep 13 00:47:03.263428 kubelet[2258]: I0913 00:47:03.263394 2258 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/acf0e14d73602c0720713c384036043f-k8s-certs\") pod \"kube-controller-manager-ip-172-31-26-227\" (UID: \"acf0e14d73602c0720713c384036043f\") " pod="kube-system/kube-controller-manager-ip-172-31-26-227" Sep 13 00:47:03.263649 kubelet[2258]: I0913 00:47:03.263585 2258 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/acf0e14d73602c0720713c384036043f-kubeconfig\") pod \"kube-controller-manager-ip-172-31-26-227\" (UID: \"acf0e14d73602c0720713c384036043f\") " pod="kube-system/kube-controller-manager-ip-172-31-26-227" Sep 13 00:47:03.263811 kubelet[2258]: I0913 00:47:03.263791 2258 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/acf0e14d73602c0720713c384036043f-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-26-227\" (UID: \"acf0e14d73602c0720713c384036043f\") " pod="kube-system/kube-controller-manager-ip-172-31-26-227" Sep 13 00:47:03.264106 kubelet[2258]: I0913 00:47:03.264071 2258 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a4e602eb0c9a40fc4f9c8fb6f3be1132-kubeconfig\") pod \"kube-scheduler-ip-172-31-26-227\" (UID: \"a4e602eb0c9a40fc4f9c8fb6f3be1132\") " pod="kube-system/kube-scheduler-ip-172-31-26-227" Sep 13 00:47:03.264299 kubelet[2258]: I0913 00:47:03.264275 2258 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/acf0e14d73602c0720713c384036043f-ca-certs\") pod \"kube-controller-manager-ip-172-31-26-227\" (UID: \"acf0e14d73602c0720713c384036043f\") " pod="kube-system/kube-controller-manager-ip-172-31-26-227" Sep 13 00:47:03.265599 kubelet[2258]: E0913 00:47:03.265501 2258 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.26.227:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-26-227?timeout=10s\": dial tcp 172.31.26.227:6443: connect: connection refused" interval="400ms" Sep 13 00:47:03.279785 systemd[1]: Created slice kubepods-burstable-podacf0e14d73602c0720713c384036043f.slice. Sep 13 00:47:03.282740 kubelet[2258]: E0913 00:47:03.282708 2258 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-26-227\" not found" node="ip-172-31-26-227" Sep 13 00:47:03.286999 kubelet[2258]: I0913 00:47:03.286021 2258 kubelet_node_status.go:75] "Attempting to register node" node="ip-172-31-26-227" Sep 13 00:47:03.286999 kubelet[2258]: E0913 00:47:03.286726 2258 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://172.31.26.227:6443/api/v1/nodes\": dial tcp 172.31.26.227:6443: connect: connection refused" node="ip-172-31-26-227" Sep 13 00:47:03.286776 systemd[1]: Created slice kubepods-burstable-poda4e602eb0c9a40fc4f9c8fb6f3be1132.slice. Sep 13 00:47:03.290676 kubelet[2258]: E0913 00:47:03.290643 2258 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-26-227\" not found" node="ip-172-31-26-227" Sep 13 00:47:03.488984 kubelet[2258]: I0913 00:47:03.488953 2258 kubelet_node_status.go:75] "Attempting to register node" node="ip-172-31-26-227" Sep 13 00:47:03.489369 kubelet[2258]: E0913 00:47:03.489335 2258 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://172.31.26.227:6443/api/v1/nodes\": dial tcp 172.31.26.227:6443: connect: connection refused" node="ip-172-31-26-227" Sep 13 00:47:03.561439 env[1726]: time="2025-09-13T00:47:03.561305502Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-26-227,Uid:fb9475d9934d25937c43a38c589da802,Namespace:kube-system,Attempt:0,}" Sep 13 00:47:03.585780 env[1726]: time="2025-09-13T00:47:03.585380015Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-26-227,Uid:acf0e14d73602c0720713c384036043f,Namespace:kube-system,Attempt:0,}" Sep 13 00:47:03.594025 env[1726]: time="2025-09-13T00:47:03.593979227Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-26-227,Uid:a4e602eb0c9a40fc4f9c8fb6f3be1132,Namespace:kube-system,Attempt:0,}" Sep 13 00:47:03.666296 kubelet[2258]: E0913 00:47:03.666248 2258 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.26.227:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-26-227?timeout=10s\": dial tcp 172.31.26.227:6443: connect: connection refused" interval="800ms" Sep 13 00:47:03.891054 kubelet[2258]: I0913 00:47:03.891023 2258 kubelet_node_status.go:75] "Attempting to register node" node="ip-172-31-26-227" Sep 13 00:47:03.891442 kubelet[2258]: E0913 00:47:03.891410 2258 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://172.31.26.227:6443/api/v1/nodes\": dial tcp 172.31.26.227:6443: connect: connection refused" node="ip-172-31-26-227" Sep 13 00:47:03.935782 kubelet[2258]: W0913 00:47:03.935696 2258 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.31.26.227:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 172.31.26.227:6443: connect: connection refused Sep 13 00:47:03.935782 kubelet[2258]: E0913 00:47:03.935771 2258 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://172.31.26.227:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 172.31.26.227:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:47:04.005485 kubelet[2258]: W0913 00:47:04.005315 2258 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.31.26.227:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-26-227&limit=500&resourceVersion=0": dial tcp 172.31.26.227:6443: connect: connection refused Sep 13 00:47:04.005749 kubelet[2258]: E0913 00:47:04.005493 2258 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://172.31.26.227:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-26-227&limit=500&resourceVersion=0\": dial tcp 172.31.26.227:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:47:04.015291 kubelet[2258]: W0913 00:47:04.015166 2258 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://172.31.26.227:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.26.227:6443: connect: connection refused Sep 13 00:47:04.015291 kubelet[2258]: E0913 00:47:04.015293 2258 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://172.31.26.227:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 172.31.26.227:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:47:04.046569 kubelet[2258]: W0913 00:47:04.046505 2258 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://172.31.26.227:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.26.227:6443: connect: connection refused Sep 13 00:47:04.046769 kubelet[2258]: E0913 00:47:04.046588 2258 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://172.31.26.227:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 172.31.26.227:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:47:04.083597 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2648445881.mount: Deactivated successfully. Sep 13 00:47:04.105139 env[1726]: time="2025-09-13T00:47:04.105095601Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:04.107393 env[1726]: time="2025-09-13T00:47:04.107341566Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:04.114595 env[1726]: time="2025-09-13T00:47:04.114523230Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:04.118088 env[1726]: time="2025-09-13T00:47:04.118036170Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:04.124948 env[1726]: time="2025-09-13T00:47:04.124903171Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:04.127477 env[1726]: time="2025-09-13T00:47:04.127432967Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:04.129807 env[1726]: time="2025-09-13T00:47:04.129761975Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:04.131509 env[1726]: time="2025-09-13T00:47:04.131468726Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:04.136668 env[1726]: time="2025-09-13T00:47:04.136621737Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:04.140778 env[1726]: time="2025-09-13T00:47:04.140728720Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:04.145075 env[1726]: time="2025-09-13T00:47:04.144954674Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:04.159106 env[1726]: time="2025-09-13T00:47:04.159048450Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:04.176999 env[1726]: time="2025-09-13T00:47:04.176347374Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:47:04.176999 env[1726]: time="2025-09-13T00:47:04.176385203Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:47:04.176999 env[1726]: time="2025-09-13T00:47:04.176395814Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:47:04.176999 env[1726]: time="2025-09-13T00:47:04.176585302Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/03e9934ffda3375ea2080daa8a2aac95a57c801f731fd33ff4161a5a8a7bb020 pid=2296 runtime=io.containerd.runc.v2 Sep 13 00:47:04.207751 systemd[1]: Started cri-containerd-03e9934ffda3375ea2080daa8a2aac95a57c801f731fd33ff4161a5a8a7bb020.scope. Sep 13 00:47:04.221358 env[1726]: time="2025-09-13T00:47:04.220149084Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:47:04.221358 env[1726]: time="2025-09-13T00:47:04.220201057Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:47:04.221358 env[1726]: time="2025-09-13T00:47:04.220223160Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:47:04.221358 env[1726]: time="2025-09-13T00:47:04.220376042Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1889ef600f0b43e680b4f4f2ca00aee4e98339cdad2c527e1b30fef60d0f9d0d pid=2324 runtime=io.containerd.runc.v2 Sep 13 00:47:04.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.238000 audit: BPF prog-id=61 op=LOAD Sep 13 00:47:04.239000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.239000 audit[2306]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2296 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:04.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033653939333466666461333337356561323038306461613861326161 Sep 13 00:47:04.239000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.239000 audit[2306]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2296 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:04.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033653939333466666461333337356561323038306461613861326161 Sep 13 00:47:04.239000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.239000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.239000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.239000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.239000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.239000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.239000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.239000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.239000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.239000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.239000 audit: BPF prog-id=62 op=LOAD Sep 13 00:47:04.239000 audit[2306]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000229130 items=0 ppid=2296 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:04.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033653939333466666461333337356561323038306461613861326161 Sep 13 00:47:04.239000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.239000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.239000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.239000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.239000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.239000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.239000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.239000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.239000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.239000 audit: BPF prog-id=63 op=LOAD Sep 13 00:47:04.239000 audit[2306]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000229178 items=0 ppid=2296 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:04.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033653939333466666461333337356561323038306461613861326161 Sep 13 00:47:04.239000 audit: BPF prog-id=63 op=UNLOAD Sep 13 00:47:04.239000 audit: BPF prog-id=62 op=UNLOAD Sep 13 00:47:04.239000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.239000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.239000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.239000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.239000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.239000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.239000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.239000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.239000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.239000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.239000 audit: BPF prog-id=64 op=LOAD Sep 13 00:47:04.239000 audit[2306]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000229588 items=0 ppid=2296 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:04.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033653939333466666461333337356561323038306461613861326161 Sep 13 00:47:04.256086 env[1726]: time="2025-09-13T00:47:04.255985330Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:47:04.256086 env[1726]: time="2025-09-13T00:47:04.256045782Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:47:04.256086 env[1726]: time="2025-09-13T00:47:04.256062023Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:47:04.256679 env[1726]: time="2025-09-13T00:47:04.256615766Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/64d8653bdf111632af1d6d45d8259ec9838069411d5cc0d9a840d3dc1936345c pid=2351 runtime=io.containerd.runc.v2 Sep 13 00:47:04.266102 systemd[1]: Started cri-containerd-1889ef600f0b43e680b4f4f2ca00aee4e98339cdad2c527e1b30fef60d0f9d0d.scope. Sep 13 00:47:04.279000 systemd[1]: Started cri-containerd-64d8653bdf111632af1d6d45d8259ec9838069411d5cc0d9a840d3dc1936345c.scope. Sep 13 00:47:04.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.309000 audit: BPF prog-id=65 op=LOAD Sep 13 00:47:04.310000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.310000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2351 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:04.310000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634643836353362646631313136333261663164366434356438323539 Sep 13 00:47:04.310000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.310000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2351 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:04.310000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634643836353362646631313136333261663164366434356438323539 Sep 13 00:47:04.310000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.310000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.310000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.310000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.310000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.310000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.310000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.310000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.310000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.310000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.310000 audit: BPF prog-id=66 op=LOAD Sep 13 00:47:04.310000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00038eb50 items=0 ppid=2351 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:04.310000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634643836353362646631313136333261663164366434356438323539 Sep 13 00:47:04.310000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.310000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.310000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.310000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.310000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.310000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.310000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.310000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.310000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.310000 audit: BPF prog-id=67 op=LOAD Sep 13 00:47:04.310000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00038eb98 items=0 ppid=2351 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:04.310000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634643836353362646631313136333261663164366434356438323539 Sep 13 00:47:04.310000 audit: BPF prog-id=67 op=UNLOAD Sep 13 00:47:04.310000 audit: BPF prog-id=66 op=UNLOAD Sep 13 00:47:04.310000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.310000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.310000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.310000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.310000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.310000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.310000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.310000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.310000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.310000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.310000 audit: BPF prog-id=68 op=LOAD Sep 13 00:47:04.310000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00038efa8 items=0 ppid=2351 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:04.310000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634643836353362646631313136333261663164366434356438323539 Sep 13 00:47:04.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.316000 audit: BPF prog-id=69 op=LOAD Sep 13 00:47:04.317000 audit[2341]: AVC avc: denied { bpf } for pid=2341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.317000 audit[2341]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2324 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:04.317000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138383965663630306630623433653638306234663466326361303061 Sep 13 00:47:04.317000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.317000 audit[2341]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2324 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:04.317000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138383965663630306630623433653638306234663466326361303061 Sep 13 00:47:04.317000 audit[2341]: AVC avc: denied { bpf } for pid=2341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.317000 audit[2341]: AVC avc: denied { bpf } for pid=2341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.317000 audit[2341]: AVC avc: denied { bpf } for pid=2341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.317000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.317000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.317000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.317000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.317000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.317000 audit[2341]: AVC avc: denied { bpf } for pid=2341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.317000 audit[2341]: AVC avc: denied { bpf } for pid=2341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.317000 audit: BPF prog-id=70 op=LOAD Sep 13 00:47:04.317000 audit[2341]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00019ebf0 items=0 ppid=2324 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:04.317000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138383965663630306630623433653638306234663466326361303061 Sep 13 00:47:04.317000 audit[2341]: AVC avc: denied { bpf } for pid=2341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.317000 audit[2341]: AVC avc: denied { bpf } for pid=2341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.317000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.317000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.317000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.317000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.317000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.317000 audit[2341]: AVC avc: denied { bpf } for pid=2341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.317000 audit[2341]: AVC avc: denied { bpf } for pid=2341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.317000 audit: BPF prog-id=71 op=LOAD Sep 13 00:47:04.317000 audit[2341]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00019ec38 items=0 ppid=2324 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:04.317000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138383965663630306630623433653638306234663466326361303061 Sep 13 00:47:04.317000 audit: BPF prog-id=71 op=UNLOAD Sep 13 00:47:04.318000 audit: BPF prog-id=70 op=UNLOAD Sep 13 00:47:04.318000 audit[2341]: AVC avc: denied { bpf } for pid=2341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.318000 audit[2341]: AVC avc: denied { bpf } for pid=2341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.318000 audit[2341]: AVC avc: denied { bpf } for pid=2341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.318000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.318000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.318000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.318000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.318000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.318000 audit[2341]: AVC avc: denied { bpf } for pid=2341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.318000 audit[2341]: AVC avc: denied { bpf } for pid=2341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.318000 audit: BPF prog-id=72 op=LOAD Sep 13 00:47:04.318000 audit[2341]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00019f048 items=0 ppid=2324 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:04.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138383965663630306630623433653638306234663466326361303061 Sep 13 00:47:04.343118 env[1726]: time="2025-09-13T00:47:04.343071607Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-26-227,Uid:fb9475d9934d25937c43a38c589da802,Namespace:kube-system,Attempt:0,} returns sandbox id \"03e9934ffda3375ea2080daa8a2aac95a57c801f731fd33ff4161a5a8a7bb020\"" Sep 13 00:47:04.352152 env[1726]: time="2025-09-13T00:47:04.352106675Z" level=info msg="CreateContainer within sandbox \"03e9934ffda3375ea2080daa8a2aac95a57c801f731fd33ff4161a5a8a7bb020\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Sep 13 00:47:04.381625 env[1726]: time="2025-09-13T00:47:04.381571920Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-26-227,Uid:acf0e14d73602c0720713c384036043f,Namespace:kube-system,Attempt:0,} returns sandbox id \"1889ef600f0b43e680b4f4f2ca00aee4e98339cdad2c527e1b30fef60d0f9d0d\"" Sep 13 00:47:04.384795 env[1726]: time="2025-09-13T00:47:04.384738481Z" level=info msg="CreateContainer within sandbox \"1889ef600f0b43e680b4f4f2ca00aee4e98339cdad2c527e1b30fef60d0f9d0d\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Sep 13 00:47:04.396215 env[1726]: time="2025-09-13T00:47:04.394774145Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-26-227,Uid:a4e602eb0c9a40fc4f9c8fb6f3be1132,Namespace:kube-system,Attempt:0,} returns sandbox id \"64d8653bdf111632af1d6d45d8259ec9838069411d5cc0d9a840d3dc1936345c\"" Sep 13 00:47:04.398581 env[1726]: time="2025-09-13T00:47:04.398520021Z" level=info msg="CreateContainer within sandbox \"64d8653bdf111632af1d6d45d8259ec9838069411d5cc0d9a840d3dc1936345c\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Sep 13 00:47:04.407118 env[1726]: time="2025-09-13T00:47:04.407071387Z" level=info msg="CreateContainer within sandbox \"03e9934ffda3375ea2080daa8a2aac95a57c801f731fd33ff4161a5a8a7bb020\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"8b968fed874458885c4d6b6d5b460cc5fb10a2e3279f9fc7bdc30a8977d1ec5c\"" Sep 13 00:47:04.408269 env[1726]: time="2025-09-13T00:47:04.408223814Z" level=info msg="StartContainer for \"8b968fed874458885c4d6b6d5b460cc5fb10a2e3279f9fc7bdc30a8977d1ec5c\"" Sep 13 00:47:04.425068 env[1726]: time="2025-09-13T00:47:04.425013678Z" level=info msg="CreateContainer within sandbox \"1889ef600f0b43e680b4f4f2ca00aee4e98339cdad2c527e1b30fef60d0f9d0d\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"04aadc8058fdcedfab4a0cb0d9e35c83d188fd3bbb0726ed796a8f8964cf37d0\"" Sep 13 00:47:04.427176 env[1726]: time="2025-09-13T00:47:04.427132123Z" level=info msg="StartContainer for \"04aadc8058fdcedfab4a0cb0d9e35c83d188fd3bbb0726ed796a8f8964cf37d0\"" Sep 13 00:47:04.439921 systemd[1]: Started cri-containerd-8b968fed874458885c4d6b6d5b460cc5fb10a2e3279f9fc7bdc30a8977d1ec5c.scope. Sep 13 00:47:04.456763 env[1726]: time="2025-09-13T00:47:04.456705481Z" level=info msg="CreateContainer within sandbox \"64d8653bdf111632af1d6d45d8259ec9838069411d5cc0d9a840d3dc1936345c\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"9147f829ed91e847124cb4bc5e7385a948982f186110f2879a80a4a59ba59f52\"" Sep 13 00:47:04.457338 env[1726]: time="2025-09-13T00:47:04.457303492Z" level=info msg="StartContainer for \"9147f829ed91e847124cb4bc5e7385a948982f186110f2879a80a4a59ba59f52\"" Sep 13 00:47:04.467766 kubelet[2258]: E0913 00:47:04.467688 2258 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.26.227:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-26-227?timeout=10s\": dial tcp 172.31.26.227:6443: connect: connection refused" interval="1.6s" Sep 13 00:47:04.471263 systemd[1]: Started cri-containerd-04aadc8058fdcedfab4a0cb0d9e35c83d188fd3bbb0726ed796a8f8964cf37d0.scope. Sep 13 00:47:04.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.479000 audit: BPF prog-id=73 op=LOAD Sep 13 00:47:04.480000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.480000 audit[2428]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2296 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:04.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862393638666564383734343538383835633464366236643562343630 Sep 13 00:47:04.480000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.480000 audit[2428]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2296 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:04.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862393638666564383734343538383835633464366236643562343630 Sep 13 00:47:04.481000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.481000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.481000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.481000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.481000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.481000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.481000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.481000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.481000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.481000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.481000 audit: BPF prog-id=74 op=LOAD Sep 13 00:47:04.481000 audit[2428]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00023d110 items=0 ppid=2296 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:04.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862393638666564383734343538383835633464366236643562343630 Sep 13 00:47:04.482000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.482000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.482000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.482000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.482000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.482000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.482000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.482000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.482000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.482000 audit: BPF prog-id=75 op=LOAD Sep 13 00:47:04.482000 audit[2428]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00023d158 items=0 ppid=2296 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:04.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862393638666564383734343538383835633464366236643562343630 Sep 13 00:47:04.483000 audit: BPF prog-id=75 op=UNLOAD Sep 13 00:47:04.483000 audit: BPF prog-id=74 op=UNLOAD Sep 13 00:47:04.483000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.483000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.483000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.483000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.483000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.483000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.483000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.483000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.483000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.483000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.483000 audit: BPF prog-id=76 op=LOAD Sep 13 00:47:04.483000 audit[2428]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00023d568 items=0 ppid=2296 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:04.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862393638666564383734343538383835633464366236643562343630 Sep 13 00:47:04.505903 systemd[1]: Started cri-containerd-9147f829ed91e847124cb4bc5e7385a948982f186110f2879a80a4a59ba59f52.scope. Sep 13 00:47:04.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.516000 audit: BPF prog-id=77 op=LOAD Sep 13 00:47:04.518000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.518000 audit[2445]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2324 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:04.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034616164633830353866646365646661623461306362306439653335 Sep 13 00:47:04.518000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.518000 audit[2445]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2324 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:04.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034616164633830353866646365646661623461306362306439653335 Sep 13 00:47:04.519000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.519000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.519000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.519000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.519000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.519000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.519000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.519000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.519000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.519000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.519000 audit: BPF prog-id=78 op=LOAD Sep 13 00:47:04.519000 audit[2445]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0000253a0 items=0 ppid=2324 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:04.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034616164633830353866646365646661623461306362306439653335 Sep 13 00:47:04.519000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.519000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.519000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.519000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.519000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.519000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.519000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.519000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.519000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.519000 audit: BPF prog-id=79 op=LOAD Sep 13 00:47:04.519000 audit[2445]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0000253e8 items=0 ppid=2324 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:04.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034616164633830353866646365646661623461306362306439653335 Sep 13 00:47:04.519000 audit: BPF prog-id=79 op=UNLOAD Sep 13 00:47:04.520000 audit: BPF prog-id=78 op=UNLOAD Sep 13 00:47:04.520000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.520000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.520000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.520000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.520000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.520000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.520000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.520000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.520000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.520000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.520000 audit: BPF prog-id=80 op=LOAD Sep 13 00:47:04.520000 audit[2445]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0000257f8 items=0 ppid=2324 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:04.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034616164633830353866646365646661623461306362306439653335 Sep 13 00:47:04.561074 env[1726]: time="2025-09-13T00:47:04.561024518Z" level=info msg="StartContainer for \"8b968fed874458885c4d6b6d5b460cc5fb10a2e3279f9fc7bdc30a8977d1ec5c\" returns successfully" Sep 13 00:47:04.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.561000 audit: BPF prog-id=81 op=LOAD Sep 13 00:47:04.562000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.562000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2351 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:04.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931343766383239656439316538343731323463623462633565373338 Sep 13 00:47:04.563000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.563000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2351 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:04.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931343766383239656439316538343731323463623462633565373338 Sep 13 00:47:04.563000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.563000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.563000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.563000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.563000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.563000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.563000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.563000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.563000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.563000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.563000 audit: BPF prog-id=82 op=LOAD Sep 13 00:47:04.563000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003d8d10 items=0 ppid=2351 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:04.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931343766383239656439316538343731323463623462633565373338 Sep 13 00:47:04.564000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.564000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.564000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.564000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.564000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.564000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.564000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.564000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.564000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.564000 audit: BPF prog-id=83 op=LOAD Sep 13 00:47:04.564000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003d8d58 items=0 ppid=2351 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:04.564000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931343766383239656439316538343731323463623462633565373338 Sep 13 00:47:04.564000 audit: BPF prog-id=83 op=UNLOAD Sep 13 00:47:04.564000 audit: BPF prog-id=82 op=UNLOAD Sep 13 00:47:04.565000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.565000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.565000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.565000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.565000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.565000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.565000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.565000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.565000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.565000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:04.565000 audit: BPF prog-id=84 op=LOAD Sep 13 00:47:04.565000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003d9168 items=0 ppid=2351 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:04.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931343766383239656439316538343731323463623462633565373338 Sep 13 00:47:04.589058 env[1726]: time="2025-09-13T00:47:04.589011650Z" level=info msg="StartContainer for \"04aadc8058fdcedfab4a0cb0d9e35c83d188fd3bbb0726ed796a8f8964cf37d0\" returns successfully" Sep 13 00:47:04.607501 env[1726]: time="2025-09-13T00:47:04.607437336Z" level=info msg="StartContainer for \"9147f829ed91e847124cb4bc5e7385a948982f186110f2879a80a4a59ba59f52\" returns successfully" Sep 13 00:47:04.694105 kubelet[2258]: I0913 00:47:04.693538 2258 kubelet_node_status.go:75] "Attempting to register node" node="ip-172-31-26-227" Sep 13 00:47:04.694105 kubelet[2258]: E0913 00:47:04.693995 2258 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://172.31.26.227:6443/api/v1/nodes\": dial tcp 172.31.26.227:6443: connect: connection refused" node="ip-172-31-26-227" Sep 13 00:47:05.088598 kubelet[2258]: E0913 00:47:05.088406 2258 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://172.31.26.227:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 172.31.26.227:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:47:05.131679 kubelet[2258]: E0913 00:47:05.131651 2258 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-26-227\" not found" node="ip-172-31-26-227" Sep 13 00:47:05.135183 kubelet[2258]: E0913 00:47:05.135157 2258 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-26-227\" not found" node="ip-172-31-26-227" Sep 13 00:47:05.139413 kubelet[2258]: E0913 00:47:05.139388 2258 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-26-227\" not found" node="ip-172-31-26-227" Sep 13 00:47:05.669961 kubelet[2258]: W0913 00:47:05.669881 2258 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://172.31.26.227:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.26.227:6443: connect: connection refused Sep 13 00:47:05.670428 kubelet[2258]: E0913 00:47:05.669972 2258 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://172.31.26.227:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 172.31.26.227:6443: connect: connection refused" logger="UnhandledError" Sep 13 00:47:06.069060 kubelet[2258]: E0913 00:47:06.068945 2258 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.26.227:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-26-227?timeout=10s\": dial tcp 172.31.26.227:6443: connect: connection refused" interval="3.2s" Sep 13 00:47:06.140585 kubelet[2258]: E0913 00:47:06.140536 2258 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-26-227\" not found" node="ip-172-31-26-227" Sep 13 00:47:06.141038 kubelet[2258]: E0913 00:47:06.141013 2258 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-26-227\" not found" node="ip-172-31-26-227" Sep 13 00:47:06.141387 kubelet[2258]: E0913 00:47:06.141364 2258 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-26-227\" not found" node="ip-172-31-26-227" Sep 13 00:47:06.195000 audit[2476]: AVC avc: denied { watch } for pid=2476 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:47:06.197745 kernel: kauditd_printk_skb: 718 callbacks suppressed Sep 13 00:47:06.197858 kernel: audit: type=1400 audit(1757724426.195:479): avc: denied { watch } for pid=2476 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:47:06.213322 kernel: audit: type=1300 audit(1757724426.195:479): arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0005ba0f0 a2=fc6 a3=0 items=0 ppid=2324 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 key=(null) Sep 13 00:47:06.195000 audit[2476]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0005ba0f0 a2=fc6 a3=0 items=0 ppid=2324 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 key=(null) Sep 13 00:47:06.195000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:47:06.227682 kernel: audit: type=1327 audit(1757724426.195:479): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:47:06.227829 kernel: audit: type=1400 audit(1757724426.195:480): avc: denied { watch } for pid=2476 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:47:06.195000 audit[2476]: AVC avc: denied { watch } for pid=2476 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:47:06.195000 audit[2476]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c00088e1c0 a2=fc6 a3=0 items=0 ppid=2324 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 key=(null) Sep 13 00:47:06.236135 kernel: audit: type=1300 audit(1757724426.195:480): arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c00088e1c0 a2=fc6 a3=0 items=0 ppid=2324 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 key=(null) Sep 13 00:47:06.236284 kernel: audit: type=1327 audit(1757724426.195:480): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:47:06.195000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:47:06.295620 kubelet[2258]: I0913 00:47:06.295586 2258 kubelet_node_status.go:75] "Attempting to register node" node="ip-172-31-26-227" Sep 13 00:47:06.296039 kubelet[2258]: E0913 00:47:06.296001 2258 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://172.31.26.227:6443/api/v1/nodes\": dial tcp 172.31.26.227:6443: connect: connection refused" node="ip-172-31-26-227" Sep 13 00:47:07.141264 kubelet[2258]: E0913 00:47:07.141232 2258 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-26-227\" not found" node="ip-172-31-26-227" Sep 13 00:47:07.141738 kubelet[2258]: E0913 00:47:07.141713 2258 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-26-227\" not found" node="ip-172-31-26-227" Sep 13 00:47:08.069000 audit[2447]: AVC avc: denied { watch } for pid=2447 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c786 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:47:08.077568 kernel: audit: type=1400 audit(1757724428.069:481): avc: denied { watch } for pid=2447 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c786 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:47:08.077722 kernel: audit: type=1300 audit(1757724428.069:481): arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c003854f90 a2=fc6 a3=0 items=0 ppid=2296 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c786 key=(null) Sep 13 00:47:08.069000 audit[2447]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c003854f90 a2=fc6 a3=0 items=0 ppid=2296 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c786 key=(null) Sep 13 00:47:08.069000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E323237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Sep 13 00:47:08.094661 kernel: audit: type=1327 audit(1757724428.069:481): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E323237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Sep 13 00:47:08.085000 audit[2447]: AVC avc: denied { watch } for pid=2447 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c786 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:47:08.104088 kernel: audit: type=1400 audit(1757724428.085:482): avc: denied { watch } for pid=2447 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c786 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:47:08.085000 audit[2447]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c008178630 a2=fc6 a3=0 items=0 ppid=2296 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c786 key=(null) Sep 13 00:47:08.085000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E323237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Sep 13 00:47:08.085000 audit[2447]: AVC avc: denied { watch } for pid=2447 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c786 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:47:08.085000 audit[2447]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c00287f060 a2=fc6 a3=0 items=0 ppid=2296 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c786 key=(null) Sep 13 00:47:08.085000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E323237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Sep 13 00:47:08.094000 audit[2447]: AVC avc: denied { watch } for pid=2447 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c786 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:47:08.094000 audit[2447]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5b a1=c0038550e0 a2=fc6 a3=0 items=0 ppid=2296 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c786 key=(null) Sep 13 00:47:08.094000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E323237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Sep 13 00:47:08.100000 audit[2447]: AVC avc: denied { watch } for pid=2447 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c786 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:47:08.100000 audit[2447]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c001929520 a2=fc6 a3=0 items=0 ppid=2296 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c786 key=(null) Sep 13 00:47:08.100000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E323237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Sep 13 00:47:08.104000 audit[2447]: AVC avc: denied { watch } for pid=2447 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c786 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:47:08.104000 audit[2447]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c0067ad170 a2=fc6 a3=0 items=0 ppid=2296 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c786 key=(null) Sep 13 00:47:08.104000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E323237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Sep 13 00:47:08.619450 kubelet[2258]: E0913 00:47:08.619421 2258 csi_plugin.go:308] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "ip-172-31-26-227" not found Sep 13 00:47:08.968050 kubelet[2258]: I0913 00:47:08.967944 2258 apiserver.go:52] "Watching apiserver" Sep 13 00:47:08.972998 kubelet[2258]: E0913 00:47:08.972965 2258 csi_plugin.go:308] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "ip-172-31-26-227" not found Sep 13 00:47:09.060519 kubelet[2258]: I0913 00:47:09.060470 2258 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Sep 13 00:47:09.273880 kubelet[2258]: E0913 00:47:09.273778 2258 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ip-172-31-26-227\" not found" node="ip-172-31-26-227" Sep 13 00:47:09.402471 kubelet[2258]: E0913 00:47:09.402445 2258 csi_plugin.go:308] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "ip-172-31-26-227" not found Sep 13 00:47:09.498185 kubelet[2258]: I0913 00:47:09.498113 2258 kubelet_node_status.go:75] "Attempting to register node" node="ip-172-31-26-227" Sep 13 00:47:09.508312 kubelet[2258]: I0913 00:47:09.508258 2258 kubelet_node_status.go:78] "Successfully registered node" node="ip-172-31-26-227" Sep 13 00:47:09.560947 kubelet[2258]: I0913 00:47:09.560806 2258 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-ip-172-31-26-227" Sep 13 00:47:09.575723 kubelet[2258]: I0913 00:47:09.575689 2258 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-ip-172-31-26-227" Sep 13 00:47:09.583231 kubelet[2258]: I0913 00:47:09.583198 2258 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ip-172-31-26-227" Sep 13 00:47:10.563660 systemd[1]: Reloading. Sep 13 00:47:10.685874 /usr/lib/systemd/system-generators/torcx-generator[2558]: time="2025-09-13T00:47:10Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 00:47:10.685914 /usr/lib/systemd/system-generators/torcx-generator[2558]: time="2025-09-13T00:47:10Z" level=info msg="torcx already run" Sep 13 00:47:10.782808 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 00:47:10.782830 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 00:47:10.803297 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 00:47:10.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.896000 audit: BPF prog-id=85 op=LOAD Sep 13 00:47:10.896000 audit: BPF prog-id=61 op=UNLOAD Sep 13 00:47:10.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.899000 audit: BPF prog-id=86 op=LOAD Sep 13 00:47:10.899000 audit: BPF prog-id=81 op=UNLOAD Sep 13 00:47:10.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.901000 audit: BPF prog-id=87 op=LOAD Sep 13 00:47:10.901000 audit: BPF prog-id=69 op=UNLOAD Sep 13 00:47:10.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.902000 audit: BPF prog-id=88 op=LOAD Sep 13 00:47:10.902000 audit: BPF prog-id=46 op=UNLOAD Sep 13 00:47:10.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.904000 audit: BPF prog-id=89 op=LOAD Sep 13 00:47:10.904000 audit: BPF prog-id=47 op=UNLOAD Sep 13 00:47:10.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.904000 audit: BPF prog-id=90 op=LOAD Sep 13 00:47:10.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.904000 audit: BPF prog-id=91 op=LOAD Sep 13 00:47:10.905000 audit: BPF prog-id=48 op=UNLOAD Sep 13 00:47:10.905000 audit: BPF prog-id=49 op=UNLOAD Sep 13 00:47:10.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.906000 audit: BPF prog-id=92 op=LOAD Sep 13 00:47:10.906000 audit: BPF prog-id=50 op=UNLOAD Sep 13 00:47:10.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.908000 audit: BPF prog-id=93 op=LOAD Sep 13 00:47:10.908000 audit: BPF prog-id=51 op=UNLOAD Sep 13 00:47:10.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.909000 audit: BPF prog-id=94 op=LOAD Sep 13 00:47:10.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.909000 audit: BPF prog-id=95 op=LOAD Sep 13 00:47:10.909000 audit: BPF prog-id=52 op=UNLOAD Sep 13 00:47:10.909000 audit: BPF prog-id=53 op=UNLOAD Sep 13 00:47:10.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.910000 audit: BPF prog-id=96 op=LOAD Sep 13 00:47:10.910000 audit: BPF prog-id=54 op=UNLOAD Sep 13 00:47:10.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.911000 audit: BPF prog-id=97 op=LOAD Sep 13 00:47:10.911000 audit: BPF prog-id=65 op=UNLOAD Sep 13 00:47:10.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.913000 audit: BPF prog-id=98 op=LOAD Sep 13 00:47:10.913000 audit: BPF prog-id=55 op=UNLOAD Sep 13 00:47:10.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.913000 audit: BPF prog-id=99 op=LOAD Sep 13 00:47:10.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.913000 audit: BPF prog-id=100 op=LOAD Sep 13 00:47:10.913000 audit: BPF prog-id=56 op=UNLOAD Sep 13 00:47:10.913000 audit: BPF prog-id=57 op=UNLOAD Sep 13 00:47:10.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.915000 audit: BPF prog-id=101 op=LOAD Sep 13 00:47:10.915000 audit: BPF prog-id=58 op=UNLOAD Sep 13 00:47:10.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.915000 audit: BPF prog-id=102 op=LOAD Sep 13 00:47:10.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.915000 audit: BPF prog-id=103 op=LOAD Sep 13 00:47:10.915000 audit: BPF prog-id=59 op=UNLOAD Sep 13 00:47:10.915000 audit: BPF prog-id=60 op=UNLOAD Sep 13 00:47:10.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.916000 audit: BPF prog-id=104 op=LOAD Sep 13 00:47:10.916000 audit: BPF prog-id=77 op=UNLOAD Sep 13 00:47:10.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:10.917000 audit: BPF prog-id=105 op=LOAD Sep 13 00:47:10.917000 audit: BPF prog-id=73 op=UNLOAD Sep 13 00:47:10.938189 systemd[1]: Stopping kubelet.service... Sep 13 00:47:10.965046 systemd[1]: kubelet.service: Deactivated successfully. Sep 13 00:47:10.965405 systemd[1]: Stopped kubelet.service. Sep 13 00:47:10.964000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:47:10.967765 systemd[1]: Starting kubelet.service... Sep 13 00:47:12.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:47:12.290165 systemd[1]: Started kubelet.service. Sep 13 00:47:12.293981 kernel: kauditd_printk_skb: 259 callbacks suppressed Sep 13 00:47:12.294074 kernel: audit: type=1130 audit(1757724432.290:732): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:47:12.372643 kubelet[2611]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 13 00:47:12.372643 kubelet[2611]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Sep 13 00:47:12.372643 kubelet[2611]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 13 00:47:12.373216 kubelet[2611]: I0913 00:47:12.372735 2611 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Sep 13 00:47:12.388239 kubelet[2611]: I0913 00:47:12.388199 2611 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" Sep 13 00:47:12.388239 kubelet[2611]: I0913 00:47:12.388234 2611 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Sep 13 00:47:12.388733 kubelet[2611]: I0913 00:47:12.388705 2611 server.go:954] "Client rotation is on, will bootstrap in background" Sep 13 00:47:12.394391 kubelet[2611]: I0913 00:47:12.394361 2611 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Sep 13 00:47:12.410166 kubelet[2611]: I0913 00:47:12.410122 2611 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Sep 13 00:47:12.418524 kubelet[2611]: E0913 00:47:12.418484 2611 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Sep 13 00:47:12.418780 kubelet[2611]: I0913 00:47:12.418766 2611 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Sep 13 00:47:12.421649 kubelet[2611]: I0913 00:47:12.421606 2611 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Sep 13 00:47:12.422152 kubelet[2611]: I0913 00:47:12.422111 2611 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Sep 13 00:47:12.422414 kubelet[2611]: I0913 00:47:12.422240 2611 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ip-172-31-26-227","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Sep 13 00:47:12.422578 kubelet[2611]: I0913 00:47:12.422535 2611 topology_manager.go:138] "Creating topology manager with none policy" Sep 13 00:47:12.422650 kubelet[2611]: I0913 00:47:12.422643 2611 container_manager_linux.go:304] "Creating device plugin manager" Sep 13 00:47:12.422753 kubelet[2611]: I0913 00:47:12.422744 2611 state_mem.go:36] "Initialized new in-memory state store" Sep 13 00:47:12.423007 kubelet[2611]: I0913 00:47:12.422997 2611 kubelet.go:446] "Attempting to sync node with API server" Sep 13 00:47:12.427830 kubelet[2611]: I0913 00:47:12.424630 2611 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" Sep 13 00:47:12.427830 kubelet[2611]: I0913 00:47:12.424671 2611 kubelet.go:352] "Adding apiserver pod source" Sep 13 00:47:12.427830 kubelet[2611]: I0913 00:47:12.424685 2611 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Sep 13 00:47:12.458904 kubelet[2611]: I0913 00:47:12.458881 2611 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Sep 13 00:47:12.459622 kubelet[2611]: I0913 00:47:12.459605 2611 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Sep 13 00:47:12.460368 kubelet[2611]: I0913 00:47:12.460354 2611 watchdog_linux.go:99] "Systemd watchdog is not enabled" Sep 13 00:47:12.460470 kubelet[2611]: I0913 00:47:12.460462 2611 server.go:1287] "Started kubelet" Sep 13 00:47:12.461000 audit[2611]: AVC avc: denied { mac_admin } for pid=2611 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:12.462062 kubelet[2611]: I0913 00:47:12.462029 2611 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Sep 13 00:47:12.462162 kubelet[2611]: I0913 00:47:12.462150 2611 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Sep 13 00:47:12.462238 kubelet[2611]: I0913 00:47:12.462232 2611 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Sep 13 00:47:12.470784 kernel: audit: type=1400 audit(1757724432.461:733): avc: denied { mac_admin } for pid=2611 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:12.470900 kernel: audit: type=1401 audit(1757724432.461:733): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:47:12.461000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:47:12.461000 audit[2611]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b6e690 a1=c000b42ba0 a2=c000b6e660 a3=25 items=0 ppid=1 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:12.474319 kubelet[2611]: I0913 00:47:12.474283 2611 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 Sep 13 00:47:12.475315 kubelet[2611]: I0913 00:47:12.475299 2611 server.go:479] "Adding debug handlers to kubelet server" Sep 13 00:47:12.476327 kubelet[2611]: I0913 00:47:12.476285 2611 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Sep 13 00:47:12.476571 kubelet[2611]: I0913 00:47:12.476539 2611 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Sep 13 00:47:12.476844 kubelet[2611]: I0913 00:47:12.476832 2611 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Sep 13 00:47:12.478393 kubelet[2611]: I0913 00:47:12.478382 2611 volume_manager.go:297] "Starting Kubelet Volume Manager" Sep 13 00:47:12.478772 kernel: audit: type=1300 audit(1757724432.461:733): arch=c000003e syscall=188 success=no exit=-22 a0=c000b6e690 a1=c000b42ba0 a2=c000b6e660 a3=25 items=0 ppid=1 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:12.461000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:47:12.483151 kubelet[2611]: I0913 00:47:12.483130 2611 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Sep 13 00:47:12.483360 kubelet[2611]: I0913 00:47:12.483351 2611 reconciler.go:26] "Reconciler: start to sync state" Sep 13 00:47:12.485976 kernel: audit: type=1327 audit(1757724432.461:733): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:47:12.461000 audit[2611]: AVC avc: denied { mac_admin } for pid=2611 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:12.489446 kubelet[2611]: I0913 00:47:12.488001 2611 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Sep 13 00:47:12.490634 kubelet[2611]: I0913 00:47:12.490613 2611 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Sep 13 00:47:12.490731 kubelet[2611]: I0913 00:47:12.490723 2611 status_manager.go:227] "Starting to sync pod status with apiserver" Sep 13 00:47:12.490798 kubelet[2611]: I0913 00:47:12.490791 2611 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Sep 13 00:47:12.490843 kubelet[2611]: I0913 00:47:12.490838 2611 kubelet.go:2382] "Starting kubelet main sync loop" Sep 13 00:47:12.490940 kubelet[2611]: E0913 00:47:12.490927 2611 kubelet.go:2406] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Sep 13 00:47:12.491564 kernel: audit: type=1400 audit(1757724432.461:734): avc: denied { mac_admin } for pid=2611 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:12.461000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:47:12.499383 kernel: audit: type=1401 audit(1757724432.461:734): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:47:12.499475 kernel: audit: type=1300 audit(1757724432.461:734): arch=c000003e syscall=188 success=no exit=-22 a0=c000b2b3e0 a1=c000b42bb8 a2=c000b6e720 a3=25 items=0 ppid=1 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:12.461000 audit[2611]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b2b3e0 a1=c000b42bb8 a2=c000b6e720 a3=25 items=0 ppid=1 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:12.461000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:47:12.511568 kernel: audit: type=1327 audit(1757724432.461:734): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:47:12.515454 kubelet[2611]: I0913 00:47:12.515436 2611 factory.go:221] Registration of the systemd container factory successfully Sep 13 00:47:12.515872 kubelet[2611]: I0913 00:47:12.515747 2611 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Sep 13 00:47:12.517357 kubelet[2611]: I0913 00:47:12.517343 2611 factory.go:221] Registration of the containerd container factory successfully Sep 13 00:47:12.579882 kubelet[2611]: I0913 00:47:12.577506 2611 cpu_manager.go:221] "Starting CPU manager" policy="none" Sep 13 00:47:12.579882 kubelet[2611]: I0913 00:47:12.577525 2611 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Sep 13 00:47:12.579882 kubelet[2611]: I0913 00:47:12.577567 2611 state_mem.go:36] "Initialized new in-memory state store" Sep 13 00:47:12.579882 kubelet[2611]: I0913 00:47:12.577778 2611 state_mem.go:88] "Updated default CPUSet" cpuSet="" Sep 13 00:47:12.579882 kubelet[2611]: I0913 00:47:12.577793 2611 state_mem.go:96] "Updated CPUSet assignments" assignments={} Sep 13 00:47:12.579882 kubelet[2611]: I0913 00:47:12.577818 2611 policy_none.go:49] "None policy: Start" Sep 13 00:47:12.579882 kubelet[2611]: I0913 00:47:12.577961 2611 memory_manager.go:186] "Starting memorymanager" policy="None" Sep 13 00:47:12.579882 kubelet[2611]: I0913 00:47:12.577978 2611 state_mem.go:35] "Initializing new in-memory state store" Sep 13 00:47:12.579882 kubelet[2611]: I0913 00:47:12.578219 2611 state_mem.go:75] "Updated machine memory state" Sep 13 00:47:12.583000 audit[2611]: AVC avc: denied { mac_admin } for pid=2611 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:12.589751 kubelet[2611]: I0913 00:47:12.583743 2611 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Sep 13 00:47:12.589751 kubelet[2611]: I0913 00:47:12.583905 2611 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" Sep 13 00:47:12.589751 kubelet[2611]: I0913 00:47:12.584128 2611 eviction_manager.go:189] "Eviction manager: starting control loop" Sep 13 00:47:12.589751 kubelet[2611]: I0913 00:47:12.584144 2611 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Sep 13 00:47:12.589751 kubelet[2611]: I0913 00:47:12.584733 2611 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Sep 13 00:47:12.591575 kernel: audit: type=1400 audit(1757724432.583:735): avc: denied { mac_admin } for pid=2611 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:12.583000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:47:12.583000 audit[2611]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000757980 a1=c000b76888 a2=c000757950 a3=25 items=0 ppid=1 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:12.583000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:47:12.652211 kubelet[2611]: I0913 00:47:12.652163 2611 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-ip-172-31-26-227" Sep 13 00:47:12.659603 kubelet[2611]: I0913 00:47:12.653996 2611 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ip-172-31-26-227" Sep 13 00:47:12.659603 kubelet[2611]: I0913 00:47:12.654485 2611 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-ip-172-31-26-227" Sep 13 00:47:12.659603 kubelet[2611]: E0913 00:47:12.655096 2611 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Sep 13 00:47:12.693479 kubelet[2611]: E0913 00:47:12.693447 2611 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-scheduler-ip-172-31-26-227\" already exists" pod="kube-system/kube-scheduler-ip-172-31-26-227" Sep 13 00:47:12.693746 kubelet[2611]: E0913 00:47:12.693730 2611 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-controller-manager-ip-172-31-26-227\" already exists" pod="kube-system/kube-controller-manager-ip-172-31-26-227" Sep 13 00:47:12.693856 kubelet[2611]: E0913 00:47:12.693846 2611 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-apiserver-ip-172-31-26-227\" already exists" pod="kube-system/kube-apiserver-ip-172-31-26-227" Sep 13 00:47:12.740000 audit[2476]: AVC avc: denied { watch } for pid=2476 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Sep 13 00:47:12.740000 audit[2476]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000a35f00 a2=fc6 a3=0 items=0 ppid=2324 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 key=(null) Sep 13 00:47:12.740000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:47:12.761787 kubelet[2611]: I0913 00:47:12.761763 2611 kubelet_node_status.go:75] "Attempting to register node" node="ip-172-31-26-227" Sep 13 00:47:12.776058 kubelet[2611]: I0913 00:47:12.776025 2611 kubelet_node_status.go:124] "Node was previously registered" node="ip-172-31-26-227" Sep 13 00:47:12.776253 kubelet[2611]: I0913 00:47:12.776111 2611 kubelet_node_status.go:78] "Successfully registered node" node="ip-172-31-26-227" Sep 13 00:47:12.795652 kubelet[2611]: I0913 00:47:12.795590 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/acf0e14d73602c0720713c384036043f-ca-certs\") pod \"kube-controller-manager-ip-172-31-26-227\" (UID: \"acf0e14d73602c0720713c384036043f\") " pod="kube-system/kube-controller-manager-ip-172-31-26-227" Sep 13 00:47:12.795652 kubelet[2611]: I0913 00:47:12.795640 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a4e602eb0c9a40fc4f9c8fb6f3be1132-kubeconfig\") pod \"kube-scheduler-ip-172-31-26-227\" (UID: \"a4e602eb0c9a40fc4f9c8fb6f3be1132\") " pod="kube-system/kube-scheduler-ip-172-31-26-227" Sep 13 00:47:12.795652 kubelet[2611]: I0913 00:47:12.795661 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/fb9475d9934d25937c43a38c589da802-ca-certs\") pod \"kube-apiserver-ip-172-31-26-227\" (UID: \"fb9475d9934d25937c43a38c589da802\") " pod="kube-system/kube-apiserver-ip-172-31-26-227" Sep 13 00:47:12.796040 kubelet[2611]: I0913 00:47:12.795699 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/fb9475d9934d25937c43a38c589da802-k8s-certs\") pod \"kube-apiserver-ip-172-31-26-227\" (UID: \"fb9475d9934d25937c43a38c589da802\") " pod="kube-system/kube-apiserver-ip-172-31-26-227" Sep 13 00:47:12.796040 kubelet[2611]: I0913 00:47:12.795717 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/fb9475d9934d25937c43a38c589da802-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-26-227\" (UID: \"fb9475d9934d25937c43a38c589da802\") " pod="kube-system/kube-apiserver-ip-172-31-26-227" Sep 13 00:47:12.796040 kubelet[2611]: I0913 00:47:12.795736 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/acf0e14d73602c0720713c384036043f-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-26-227\" (UID: \"acf0e14d73602c0720713c384036043f\") " pod="kube-system/kube-controller-manager-ip-172-31-26-227" Sep 13 00:47:12.796040 kubelet[2611]: I0913 00:47:12.795881 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/acf0e14d73602c0720713c384036043f-k8s-certs\") pod \"kube-controller-manager-ip-172-31-26-227\" (UID: \"acf0e14d73602c0720713c384036043f\") " pod="kube-system/kube-controller-manager-ip-172-31-26-227" Sep 13 00:47:12.796040 kubelet[2611]: I0913 00:47:12.795909 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/acf0e14d73602c0720713c384036043f-kubeconfig\") pod \"kube-controller-manager-ip-172-31-26-227\" (UID: \"acf0e14d73602c0720713c384036043f\") " pod="kube-system/kube-controller-manager-ip-172-31-26-227" Sep 13 00:47:12.796189 kubelet[2611]: I0913 00:47:12.795949 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/acf0e14d73602c0720713c384036043f-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-26-227\" (UID: \"acf0e14d73602c0720713c384036043f\") " pod="kube-system/kube-controller-manager-ip-172-31-26-227" Sep 13 00:47:13.239000 audit[2476]: AVC avc: denied { watch } for pid=2476 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:47:13.239000 audit[2476]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000a50520 a2=fc6 a3=0 items=0 ppid=2324 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 key=(null) Sep 13 00:47:13.239000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:47:13.240000 audit[2476]: AVC avc: denied { watch } for pid=2476 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:47:13.240000 audit[2476]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000a50540 a2=fc6 a3=0 items=0 ppid=2324 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 key=(null) Sep 13 00:47:13.240000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:47:13.240000 audit[2476]: AVC avc: denied { watch } for pid=2476 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:47:13.240000 audit[2476]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000a50560 a2=fc6 a3=0 items=0 ppid=2324 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 key=(null) Sep 13 00:47:13.240000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:47:13.240000 audit[2476]: AVC avc: denied { watch } for pid=2476 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:47:13.240000 audit[2476]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000af6ba0 a2=fc6 a3=0 items=0 ppid=2324 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 key=(null) Sep 13 00:47:13.240000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:47:13.441210 kubelet[2611]: I0913 00:47:13.441141 2611 apiserver.go:52] "Watching apiserver" Sep 13 00:47:13.483572 kubelet[2611]: I0913 00:47:13.483526 2611 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Sep 13 00:47:13.522130 kubelet[2611]: I0913 00:47:13.521972 2611 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ip-172-31-26-227" podStartSLOduration=4.52195274 podStartE2EDuration="4.52195274s" podCreationTimestamp="2025-09-13 00:47:09 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-13 00:47:13.50931128 +0000 UTC m=+1.198425280" watchObservedRunningTime="2025-09-13 00:47:13.52195274 +0000 UTC m=+1.211066742" Sep 13 00:47:13.535145 kubelet[2611]: I0913 00:47:13.535092 2611 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ip-172-31-26-227" podStartSLOduration=4.535077563 podStartE2EDuration="4.535077563s" podCreationTimestamp="2025-09-13 00:47:09 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-13 00:47:13.523122048 +0000 UTC m=+1.212236059" watchObservedRunningTime="2025-09-13 00:47:13.535077563 +0000 UTC m=+1.224191563" Sep 13 00:47:13.549718 kubelet[2611]: I0913 00:47:13.549682 2611 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-ip-172-31-26-227" Sep 13 00:47:13.549999 kubelet[2611]: I0913 00:47:13.549981 2611 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ip-172-31-26-227" Sep 13 00:47:13.558217 kubelet[2611]: I0913 00:47:13.555892 2611 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ip-172-31-26-227" podStartSLOduration=4.555874219 podStartE2EDuration="4.555874219s" podCreationTimestamp="2025-09-13 00:47:09 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-13 00:47:13.53536266 +0000 UTC m=+1.224476661" watchObservedRunningTime="2025-09-13 00:47:13.555874219 +0000 UTC m=+1.244988212" Sep 13 00:47:13.563242 kubelet[2611]: E0913 00:47:13.563205 2611 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-scheduler-ip-172-31-26-227\" already exists" pod="kube-system/kube-scheduler-ip-172-31-26-227" Sep 13 00:47:13.563654 kubelet[2611]: E0913 00:47:13.563626 2611 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-apiserver-ip-172-31-26-227\" already exists" pod="kube-system/kube-apiserver-ip-172-31-26-227" Sep 13 00:47:14.942895 amazon-ssm-agent[1767]: 2025-09-13 00:47:14 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Sep 13 00:47:14.960711 update_engine[1720]: I0913 00:47:14.960645 1720 update_attempter.cc:509] Updating boot flags... Sep 13 00:47:15.992461 kubelet[2611]: I0913 00:47:15.992417 2611 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Sep 13 00:47:15.993426 env[1726]: time="2025-09-13T00:47:15.993377694Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Sep 13 00:47:15.993838 kubelet[2611]: I0913 00:47:15.993657 2611 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Sep 13 00:47:16.579997 systemd[1]: Created slice kubepods-besteffort-podc6caa982_a9f2_4a37_8e6f_8d39cfa0cdb1.slice. Sep 13 00:47:16.626174 kubelet[2611]: I0913 00:47:16.626125 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/c6caa982-a9f2-4a37-8e6f-8d39cfa0cdb1-kube-proxy\") pod \"kube-proxy-fzwn6\" (UID: \"c6caa982-a9f2-4a37-8e6f-8d39cfa0cdb1\") " pod="kube-system/kube-proxy-fzwn6" Sep 13 00:47:16.626357 kubelet[2611]: I0913 00:47:16.626180 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/c6caa982-a9f2-4a37-8e6f-8d39cfa0cdb1-lib-modules\") pod \"kube-proxy-fzwn6\" (UID: \"c6caa982-a9f2-4a37-8e6f-8d39cfa0cdb1\") " pod="kube-system/kube-proxy-fzwn6" Sep 13 00:47:16.626357 kubelet[2611]: I0913 00:47:16.626217 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/c6caa982-a9f2-4a37-8e6f-8d39cfa0cdb1-xtables-lock\") pod \"kube-proxy-fzwn6\" (UID: \"c6caa982-a9f2-4a37-8e6f-8d39cfa0cdb1\") " pod="kube-system/kube-proxy-fzwn6" Sep 13 00:47:16.626357 kubelet[2611]: I0913 00:47:16.626239 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vbfpw\" (UniqueName: \"kubernetes.io/projected/c6caa982-a9f2-4a37-8e6f-8d39cfa0cdb1-kube-api-access-vbfpw\") pod \"kube-proxy-fzwn6\" (UID: \"c6caa982-a9f2-4a37-8e6f-8d39cfa0cdb1\") " pod="kube-system/kube-proxy-fzwn6" Sep 13 00:47:16.732929 kubelet[2611]: I0913 00:47:16.732884 2611 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Sep 13 00:47:16.890369 env[1726]: time="2025-09-13T00:47:16.890320489Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-fzwn6,Uid:c6caa982-a9f2-4a37-8e6f-8d39cfa0cdb1,Namespace:kube-system,Attempt:0,}" Sep 13 00:47:16.926939 env[1726]: time="2025-09-13T00:47:16.926854011Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:47:16.927148 env[1726]: time="2025-09-13T00:47:16.926898625Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:47:16.927148 env[1726]: time="2025-09-13T00:47:16.926933749Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:47:16.927600 env[1726]: time="2025-09-13T00:47:16.927178827Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5066c1dd38353d6a75044a0d13d12ddaea60b120fd6be64ab7bfa867a2c0fa5b pid=2928 runtime=io.containerd.runc.v2 Sep 13 00:47:16.965733 systemd[1]: Started cri-containerd-5066c1dd38353d6a75044a0d13d12ddaea60b120fd6be64ab7bfa867a2c0fa5b.scope. Sep 13 00:47:16.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:16.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:16.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:16.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:16.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:16.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:16.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:16.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:16.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:16.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:16.986000 audit: BPF prog-id=106 op=LOAD Sep 13 00:47:16.987000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:16.987000 audit[2937]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2928 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:16.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530363663316464333833353364366137353034346130643133643132 Sep 13 00:47:16.987000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:16.987000 audit[2937]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2928 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:16.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530363663316464333833353364366137353034346130643133643132 Sep 13 00:47:16.987000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:16.987000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:16.987000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:16.987000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:16.987000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:16.987000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:16.987000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:16.987000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:16.987000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:16.987000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:16.987000 audit: BPF prog-id=107 op=LOAD Sep 13 00:47:16.987000 audit[2937]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0003191d0 items=0 ppid=2928 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:16.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530363663316464333833353364366137353034346130643133643132 Sep 13 00:47:16.989000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:16.989000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:16.989000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:16.989000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:16.989000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:16.989000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:16.989000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:16.989000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:16.989000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:16.989000 audit: BPF prog-id=108 op=LOAD Sep 13 00:47:16.989000 audit[2937]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000319218 items=0 ppid=2928 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:16.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530363663316464333833353364366137353034346130643133643132 Sep 13 00:47:16.989000 audit: BPF prog-id=108 op=UNLOAD Sep 13 00:47:16.990000 audit: BPF prog-id=107 op=UNLOAD Sep 13 00:47:16.990000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:16.990000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:16.990000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:16.990000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:16.990000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:16.990000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:16.990000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:16.990000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:16.990000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:16.990000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:16.990000 audit: BPF prog-id=109 op=LOAD Sep 13 00:47:16.990000 audit[2937]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000319628 items=0 ppid=2928 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:16.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530363663316464333833353364366137353034346130643133643132 Sep 13 00:47:17.028322 env[1726]: time="2025-09-13T00:47:17.028281103Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-fzwn6,Uid:c6caa982-a9f2-4a37-8e6f-8d39cfa0cdb1,Namespace:kube-system,Attempt:0,} returns sandbox id \"5066c1dd38353d6a75044a0d13d12ddaea60b120fd6be64ab7bfa867a2c0fa5b\"" Sep 13 00:47:17.032221 env[1726]: time="2025-09-13T00:47:17.031882095Z" level=info msg="CreateContainer within sandbox \"5066c1dd38353d6a75044a0d13d12ddaea60b120fd6be64ab7bfa867a2c0fa5b\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Sep 13 00:47:17.074006 env[1726]: time="2025-09-13T00:47:17.073956566Z" level=info msg="CreateContainer within sandbox \"5066c1dd38353d6a75044a0d13d12ddaea60b120fd6be64ab7bfa867a2c0fa5b\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"e305dd843c0e2ac8442bcfb91bc32aa403c7145ba0e5bc9c08e1be6c954cf3d4\"" Sep 13 00:47:17.074987 env[1726]: time="2025-09-13T00:47:17.074956511Z" level=info msg="StartContainer for \"e305dd843c0e2ac8442bcfb91bc32aa403c7145ba0e5bc9c08e1be6c954cf3d4\"" Sep 13 00:47:17.106946 systemd[1]: Started cri-containerd-e305dd843c0e2ac8442bcfb91bc32aa403c7145ba0e5bc9c08e1be6c954cf3d4.scope. Sep 13 00:47:17.149908 systemd[1]: Created slice kubepods-besteffort-pod0b34ed5a_1d80_4223_88c6_59ef916f37f7.slice. Sep 13 00:47:17.185000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.185000 audit[2968]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f187951ad48 items=0 ppid=2928 pid=2968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:17.185000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533303564643834336330653261633834343262636662393162633332 Sep 13 00:47:17.185000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.185000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.185000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.185000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.185000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.185000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.185000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.185000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.185000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.185000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.185000 audit: BPF prog-id=110 op=LOAD Sep 13 00:47:17.185000 audit[2968]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0001b5798 items=0 ppid=2928 pid=2968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:17.185000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533303564643834336330653261633834343262636662393162633332 Sep 13 00:47:17.185000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.185000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.185000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.185000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.185000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.185000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.185000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.185000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.185000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.185000 audit: BPF prog-id=111 op=LOAD Sep 13 00:47:17.185000 audit[2968]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0001b57e8 items=0 ppid=2928 pid=2968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:17.185000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533303564643834336330653261633834343262636662393162633332 Sep 13 00:47:17.185000 audit: BPF prog-id=111 op=UNLOAD Sep 13 00:47:17.185000 audit: BPF prog-id=110 op=UNLOAD Sep 13 00:47:17.185000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.185000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.185000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.185000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.185000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.185000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.185000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.185000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.185000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.185000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.185000 audit: BPF prog-id=112 op=LOAD Sep 13 00:47:17.185000 audit[2968]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0001b5878 items=0 ppid=2928 pid=2968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:17.185000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533303564643834336330653261633834343262636662393162633332 Sep 13 00:47:17.206973 env[1726]: time="2025-09-13T00:47:17.206919468Z" level=info msg="StartContainer for \"e305dd843c0e2ac8442bcfb91bc32aa403c7145ba0e5bc9c08e1be6c954cf3d4\" returns successfully" Sep 13 00:47:17.229134 kubelet[2611]: I0913 00:47:17.228920 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mfsgx\" (UniqueName: \"kubernetes.io/projected/0b34ed5a-1d80-4223-88c6-59ef916f37f7-kube-api-access-mfsgx\") pod \"tigera-operator-755d956888-t5dr5\" (UID: \"0b34ed5a-1d80-4223-88c6-59ef916f37f7\") " pod="tigera-operator/tigera-operator-755d956888-t5dr5" Sep 13 00:47:17.229134 kubelet[2611]: I0913 00:47:17.228969 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/0b34ed5a-1d80-4223-88c6-59ef916f37f7-var-lib-calico\") pod \"tigera-operator-755d956888-t5dr5\" (UID: \"0b34ed5a-1d80-4223-88c6-59ef916f37f7\") " pod="tigera-operator/tigera-operator-755d956888-t5dr5" Sep 13 00:47:17.454448 env[1726]: time="2025-09-13T00:47:17.454329397Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-755d956888-t5dr5,Uid:0b34ed5a-1d80-4223-88c6-59ef916f37f7,Namespace:tigera-operator,Attempt:0,}" Sep 13 00:47:17.480847 env[1726]: time="2025-09-13T00:47:17.480763480Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:47:17.481046 env[1726]: time="2025-09-13T00:47:17.480805944Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:47:17.481046 env[1726]: time="2025-09-13T00:47:17.480822075Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:47:17.481046 env[1726]: time="2025-09-13T00:47:17.480998599Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7d0c343c589d275451dfbf3b4a882cdb6db9272695571d7d8bca34dab99bedcc pid=3002 runtime=io.containerd.runc.v2 Sep 13 00:47:17.495653 systemd[1]: Started cri-containerd-7d0c343c589d275451dfbf3b4a882cdb6db9272695571d7d8bca34dab99bedcc.scope. Sep 13 00:47:17.518632 kernel: kauditd_printk_skb: 118 callbacks suppressed Sep 13 00:47:17.518772 kernel: audit: type=1400 audit(1757724437.514:765): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.535111 kernel: audit: type=1400 audit(1757724437.514:766): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.535234 kernel: audit: type=1400 audit(1757724437.514:767): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.544631 kernel: audit: type=1400 audit(1757724437.514:768): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.555625 kernel: audit: type=1400 audit(1757724437.514:769): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.566794 kernel: audit: type=1400 audit(1757724437.514:770): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.581649 kernel: audit: type=1400 audit(1757724437.514:771): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.581756 kernel: audit: type=1400 audit(1757724437.514:772): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.592562 kernel: audit: type=1400 audit(1757724437.514:773): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.602566 kernel: audit: type=1400 audit(1757724437.516:774): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.516000 audit: BPF prog-id=113 op=LOAD Sep 13 00:47:17.522000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.522000 audit[3013]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3002 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:17.522000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764306333343363353839643237353435316466626633623461383832 Sep 13 00:47:17.522000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.522000 audit[3013]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3002 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:17.522000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764306333343363353839643237353435316466626633623461383832 Sep 13 00:47:17.522000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.522000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.522000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.522000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.522000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.522000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.522000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.522000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.522000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.522000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.522000 audit: BPF prog-id=114 op=LOAD Sep 13 00:47:17.522000 audit[3013]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0002d06e0 items=0 ppid=3002 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:17.522000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764306333343363353839643237353435316466626633623461383832 Sep 13 00:47:17.522000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.522000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.522000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.522000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.522000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.522000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.522000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.522000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.522000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.522000 audit: BPF prog-id=115 op=LOAD Sep 13 00:47:17.522000 audit[3013]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0002d0728 items=0 ppid=3002 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:17.522000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764306333343363353839643237353435316466626633623461383832 Sep 13 00:47:17.522000 audit: BPF prog-id=115 op=UNLOAD Sep 13 00:47:17.522000 audit: BPF prog-id=114 op=UNLOAD Sep 13 00:47:17.522000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.522000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.522000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.522000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.522000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.522000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.522000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.522000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.522000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.522000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:17.522000 audit: BPF prog-id=116 op=LOAD Sep 13 00:47:17.522000 audit[3013]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0002d0b38 items=0 ppid=3002 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:17.522000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764306333343363353839643237353435316466626633623461383832 Sep 13 00:47:17.616773 env[1726]: time="2025-09-13T00:47:17.616714410Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-755d956888-t5dr5,Uid:0b34ed5a-1d80-4223-88c6-59ef916f37f7,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"7d0c343c589d275451dfbf3b4a882cdb6db9272695571d7d8bca34dab99bedcc\"" Sep 13 00:47:17.619720 env[1726]: time="2025-09-13T00:47:17.619680741Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.6\"" Sep 13 00:47:17.744272 systemd[1]: run-containerd-runc-k8s.io-5066c1dd38353d6a75044a0d13d12ddaea60b120fd6be64ab7bfa867a2c0fa5b-runc.mFOL7c.mount: Deactivated successfully. Sep 13 00:47:18.301000 audit[3071]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=3071 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:47:18.301000 audit[3071]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd7080ddc0 a2=0 a3=7ffd7080ddac items=0 ppid=2978 pid=3071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.301000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 13 00:47:18.309000 audit[3072]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=3072 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:47:18.309000 audit[3072]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc3c0143e0 a2=0 a3=7ffc3c0143cc items=0 ppid=2978 pid=3072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.309000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 13 00:47:18.310000 audit[3073]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=3073 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:47:18.310000 audit[3073]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd250acc40 a2=0 a3=7ffd250acc2c items=0 ppid=2978 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.310000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 13 00:47:18.318000 audit[3074]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=3074 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:47:18.318000 audit[3074]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff5fdf4b60 a2=0 a3=7fff5fdf4b4c items=0 ppid=2978 pid=3074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.318000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 13 00:47:18.319000 audit[3075]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=3075 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:47:18.319000 audit[3075]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff3c535bb0 a2=0 a3=7fff3c535b9c items=0 ppid=2978 pid=3075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.319000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 13 00:47:18.324000 audit[3076]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=3076 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:47:18.324000 audit[3076]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff78167360 a2=0 a3=7fff7816734c items=0 ppid=2978 pid=3076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.324000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 13 00:47:18.417000 audit[3077]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=3077 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:47:18.417000 audit[3077]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffeff5f3af0 a2=0 a3=7ffeff5f3adc items=0 ppid=2978 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.417000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 13 00:47:18.422000 audit[3079]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=3079 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:47:18.422000 audit[3079]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe3e60c9d0 a2=0 a3=7ffe3e60c9bc items=0 ppid=2978 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.422000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Sep 13 00:47:18.434000 audit[3082]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=3082 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:47:18.434000 audit[3082]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffeacb1c1e0 a2=0 a3=7ffeacb1c1cc items=0 ppid=2978 pid=3082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.434000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Sep 13 00:47:18.435000 audit[3083]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=3083 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:47:18.435000 audit[3083]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc53ec02e0 a2=0 a3=7ffc53ec02cc items=0 ppid=2978 pid=3083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.435000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 13 00:47:18.439000 audit[3085]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=3085 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:47:18.439000 audit[3085]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd2bb74b00 a2=0 a3=7ffd2bb74aec items=0 ppid=2978 pid=3085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.439000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 13 00:47:18.440000 audit[3086]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=3086 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:47:18.440000 audit[3086]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe35824b70 a2=0 a3=7ffe35824b5c items=0 ppid=2978 pid=3086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.440000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 13 00:47:18.443000 audit[3088]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=3088 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:47:18.443000 audit[3088]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff98b30a90 a2=0 a3=7fff98b30a7c items=0 ppid=2978 pid=3088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.443000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 13 00:47:18.447000 audit[3091]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=3091 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:47:18.447000 audit[3091]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdd8d0f4d0 a2=0 a3=7ffdd8d0f4bc items=0 ppid=2978 pid=3091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.447000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Sep 13 00:47:18.449000 audit[3092]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=3092 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:47:18.449000 audit[3092]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffde13a5740 a2=0 a3=7ffde13a572c items=0 ppid=2978 pid=3092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.449000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 13 00:47:18.452000 audit[3094]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=3094 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:47:18.452000 audit[3094]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd00a8ed20 a2=0 a3=7ffd00a8ed0c items=0 ppid=2978 pid=3094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.452000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 13 00:47:18.453000 audit[3095]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=3095 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:47:18.453000 audit[3095]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc060da760 a2=0 a3=7ffc060da74c items=0 ppid=2978 pid=3095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.453000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 13 00:47:18.457000 audit[3097]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=3097 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:47:18.457000 audit[3097]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdb83a6b40 a2=0 a3=7ffdb83a6b2c items=0 ppid=2978 pid=3097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.457000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 00:47:18.461000 audit[3100]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=3100 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:47:18.461000 audit[3100]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd219364d0 a2=0 a3=7ffd219364bc items=0 ppid=2978 pid=3100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.461000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 00:47:18.466000 audit[3103]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=3103 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:47:18.466000 audit[3103]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffa1478840 a2=0 a3=7fffa147882c items=0 ppid=2978 pid=3103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.466000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 13 00:47:18.469000 audit[3104]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=3104 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:47:18.469000 audit[3104]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffed9e74790 a2=0 a3=7ffed9e7477c items=0 ppid=2978 pid=3104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.469000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 13 00:47:18.472000 audit[3106]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=3106 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:47:18.472000 audit[3106]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffdd167f5c0 a2=0 a3=7ffdd167f5ac items=0 ppid=2978 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.472000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:47:18.477000 audit[3109]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=3109 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:47:18.477000 audit[3109]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff8b298e20 a2=0 a3=7fff8b298e0c items=0 ppid=2978 pid=3109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.477000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:47:18.478000 audit[3110]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=3110 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:47:18.478000 audit[3110]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff7982f780 a2=0 a3=7fff7982f76c items=0 ppid=2978 pid=3110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.478000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 13 00:47:18.481000 audit[3112]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=3112 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:47:18.481000 audit[3112]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffe2de1b610 a2=0 a3=7ffe2de1b5fc items=0 ppid=2978 pid=3112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.481000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 13 00:47:18.530000 audit[3118]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=3118 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:47:18.530000 audit[3118]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffc2a880610 a2=0 a3=7ffc2a8805fc items=0 ppid=2978 pid=3118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.530000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:47:18.542000 audit[3118]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=3118 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:47:18.542000 audit[3118]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffc2a880610 a2=0 a3=7ffc2a8805fc items=0 ppid=2978 pid=3118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.542000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:47:18.544000 audit[3123]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=3123 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:47:18.544000 audit[3123]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc95ed0ea0 a2=0 a3=7ffc95ed0e8c items=0 ppid=2978 pid=3123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.544000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 13 00:47:18.548000 audit[3125]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=3125 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:47:18.548000 audit[3125]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc4d823850 a2=0 a3=7ffc4d82383c items=0 ppid=2978 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.548000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Sep 13 00:47:18.553000 audit[3128]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=3128 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:47:18.553000 audit[3128]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc7bd5d2b0 a2=0 a3=7ffc7bd5d29c items=0 ppid=2978 pid=3128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.553000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Sep 13 00:47:18.555000 audit[3129]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=3129 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:47:18.555000 audit[3129]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc1965c4e0 a2=0 a3=7ffc1965c4cc items=0 ppid=2978 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.555000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 13 00:47:18.559000 audit[3131]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=3131 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:47:18.559000 audit[3131]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffee205cfc0 a2=0 a3=7ffee205cfac items=0 ppid=2978 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.559000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 13 00:47:18.561000 audit[3132]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=3132 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:47:18.561000 audit[3132]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff0e208f10 a2=0 a3=7fff0e208efc items=0 ppid=2978 pid=3132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.561000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 13 00:47:18.565000 audit[3134]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=3134 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:47:18.565000 audit[3134]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff4ef8fae0 a2=0 a3=7fff4ef8facc items=0 ppid=2978 pid=3134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.565000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Sep 13 00:47:18.569000 audit[3137]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=3137 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:47:18.569000 audit[3137]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd62b19b30 a2=0 a3=7ffd62b19b1c items=0 ppid=2978 pid=3137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.569000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 13 00:47:18.572000 audit[3138]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=3138 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:47:18.572000 audit[3138]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffddcc789e0 a2=0 a3=7ffddcc789cc items=0 ppid=2978 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.572000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 13 00:47:18.575000 audit[3140]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=3140 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:47:18.575000 audit[3140]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc47c07650 a2=0 a3=7ffc47c0763c items=0 ppid=2978 pid=3140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.575000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 13 00:47:18.576000 audit[3141]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=3141 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:47:18.576000 audit[3141]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd0c2e5260 a2=0 a3=7ffd0c2e524c items=0 ppid=2978 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.576000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 13 00:47:18.579000 audit[3143]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=3143 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:47:18.579000 audit[3143]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff6c3cc2a0 a2=0 a3=7fff6c3cc28c items=0 ppid=2978 pid=3143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.579000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 00:47:18.584000 audit[3146]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=3146 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:47:18.584000 audit[3146]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc79407a00 a2=0 a3=7ffc794079ec items=0 ppid=2978 pid=3146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.584000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 13 00:47:18.590000 audit[3149]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=3149 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:47:18.590000 audit[3149]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff72451130 a2=0 a3=7fff7245111c items=0 ppid=2978 pid=3149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.590000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Sep 13 00:47:18.591000 audit[3150]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=3150 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:47:18.591000 audit[3150]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff1f1fe420 a2=0 a3=7fff1f1fe40c items=0 ppid=2978 pid=3150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.591000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 13 00:47:18.594000 audit[3152]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=3152 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:47:18.594000 audit[3152]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff49591aa0 a2=0 a3=7fff49591a8c items=0 ppid=2978 pid=3152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.594000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:47:18.598000 audit[3155]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=3155 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:47:18.598000 audit[3155]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc7becba60 a2=0 a3=7ffc7becba4c items=0 ppid=2978 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.598000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:47:18.600000 audit[3156]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=3156 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:47:18.600000 audit[3156]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd8f0d9b0 a2=0 a3=7ffdd8f0d99c items=0 ppid=2978 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.600000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 13 00:47:18.603000 audit[3158]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=3158 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:47:18.603000 audit[3158]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc0a9553e0 a2=0 a3=7ffc0a9553cc items=0 ppid=2978 pid=3158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.603000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 13 00:47:18.604000 audit[3159]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=3159 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:47:18.604000 audit[3159]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcb93365b0 a2=0 a3=7ffcb933659c items=0 ppid=2978 pid=3159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.604000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 13 00:47:18.607000 audit[3161]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=3161 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:47:18.607000 audit[3161]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffbd13e9e0 a2=0 a3=7fffbd13e9cc items=0 ppid=2978 pid=3161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.607000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:47:18.611000 audit[3164]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=3164 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:47:18.611000 audit[3164]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffef6d78fb0 a2=0 a3=7ffef6d78f9c items=0 ppid=2978 pid=3164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.611000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:47:18.616000 audit[3166]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=3166 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 13 00:47:18.616000 audit[3166]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffe9346cf10 a2=0 a3=7ffe9346cefc items=0 ppid=2978 pid=3166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.616000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:47:18.617000 audit[3166]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=3166 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 13 00:47:18.617000 audit[3166]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffe9346cf10 a2=0 a3=7ffe9346cefc items=0 ppid=2978 pid=3166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:18.617000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:47:18.918884 kubelet[2611]: I0913 00:47:18.918810 2611 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-fzwn6" podStartSLOduration=2.918788395 podStartE2EDuration="2.918788395s" podCreationTimestamp="2025-09-13 00:47:16 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-13 00:47:17.588505706 +0000 UTC m=+5.277619707" watchObservedRunningTime="2025-09-13 00:47:18.918788395 +0000 UTC m=+6.607902397" Sep 13 00:47:19.129377 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1688585316.mount: Deactivated successfully. Sep 13 00:47:20.165017 env[1726]: time="2025-09-13T00:47:20.164964021Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.38.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:20.169376 env[1726]: time="2025-09-13T00:47:20.169327189Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1911afdd8478c6ca3036ff85614050d5d19acc0f0c3f6a5a7b3e34b38dd309c9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:20.172561 env[1726]: time="2025-09-13T00:47:20.172501090Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.38.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:20.175691 env[1726]: time="2025-09-13T00:47:20.175642549Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:00a7a9b62f9b9a4e0856128b078539783b8352b07f707bff595cb604cc580f6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:20.176675 env[1726]: time="2025-09-13T00:47:20.176630418Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.6\" returns image reference \"sha256:1911afdd8478c6ca3036ff85614050d5d19acc0f0c3f6a5a7b3e34b38dd309c9\"" Sep 13 00:47:20.180099 env[1726]: time="2025-09-13T00:47:20.179639355Z" level=info msg="CreateContainer within sandbox \"7d0c343c589d275451dfbf3b4a882cdb6db9272695571d7d8bca34dab99bedcc\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Sep 13 00:47:20.207727 env[1726]: time="2025-09-13T00:47:20.207657883Z" level=info msg="CreateContainer within sandbox \"7d0c343c589d275451dfbf3b4a882cdb6db9272695571d7d8bca34dab99bedcc\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"f1b0cd01527db53878e9a2ed98525219c01e3312a1bb8a726473eedb81f8063d\"" Sep 13 00:47:20.209370 env[1726]: time="2025-09-13T00:47:20.208749453Z" level=info msg="StartContainer for \"f1b0cd01527db53878e9a2ed98525219c01e3312a1bb8a726473eedb81f8063d\"" Sep 13 00:47:20.247525 systemd[1]: Started cri-containerd-f1b0cd01527db53878e9a2ed98525219c01e3312a1bb8a726473eedb81f8063d.scope. Sep 13 00:47:20.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:20.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:20.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:20.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:20.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:20.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:20.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:20.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:20.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:20.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:20.275000 audit: BPF prog-id=117 op=LOAD Sep 13 00:47:20.275000 audit[3174]: AVC avc: denied { bpf } for pid=3174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:20.275000 audit[3174]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3002 pid=3174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:20.275000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631623063643031353237646235333837386539613265643938353235 Sep 13 00:47:20.275000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:20.275000 audit[3174]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3002 pid=3174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:20.275000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631623063643031353237646235333837386539613265643938353235 Sep 13 00:47:20.275000 audit[3174]: AVC avc: denied { bpf } for pid=3174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:20.275000 audit[3174]: AVC avc: denied { bpf } for pid=3174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:20.275000 audit[3174]: AVC avc: denied { bpf } for pid=3174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:20.275000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:20.275000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:20.275000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:20.275000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:20.275000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:20.275000 audit[3174]: AVC avc: denied { bpf } for pid=3174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:20.275000 audit[3174]: AVC avc: denied { bpf } for pid=3174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:20.275000 audit: BPF prog-id=118 op=LOAD Sep 13 00:47:20.275000 audit[3174]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003983b0 items=0 ppid=3002 pid=3174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:20.275000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631623063643031353237646235333837386539613265643938353235 Sep 13 00:47:20.276000 audit[3174]: AVC avc: denied { bpf } for pid=3174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:20.276000 audit[3174]: AVC avc: denied { bpf } for pid=3174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:20.276000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:20.276000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:20.276000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:20.276000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:20.276000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:20.276000 audit[3174]: AVC avc: denied { bpf } for pid=3174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:20.276000 audit[3174]: AVC avc: denied { bpf } for pid=3174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:20.276000 audit: BPF prog-id=119 op=LOAD Sep 13 00:47:20.276000 audit[3174]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003983f8 items=0 ppid=3002 pid=3174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:20.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631623063643031353237646235333837386539613265643938353235 Sep 13 00:47:20.276000 audit: BPF prog-id=119 op=UNLOAD Sep 13 00:47:20.276000 audit: BPF prog-id=118 op=UNLOAD Sep 13 00:47:20.276000 audit[3174]: AVC avc: denied { bpf } for pid=3174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:20.276000 audit[3174]: AVC avc: denied { bpf } for pid=3174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:20.276000 audit[3174]: AVC avc: denied { bpf } for pid=3174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:20.276000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:20.276000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:20.276000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:20.276000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:20.276000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:20.276000 audit[3174]: AVC avc: denied { bpf } for pid=3174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:20.276000 audit[3174]: AVC avc: denied { bpf } for pid=3174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:20.276000 audit: BPF prog-id=120 op=LOAD Sep 13 00:47:20.276000 audit[3174]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000398808 items=0 ppid=3002 pid=3174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:20.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631623063643031353237646235333837386539613265643938353235 Sep 13 00:47:20.295629 env[1726]: time="2025-09-13T00:47:20.292702076Z" level=info msg="StartContainer for \"f1b0cd01527db53878e9a2ed98525219c01e3312a1bb8a726473eedb81f8063d\" returns successfully" Sep 13 00:47:21.195616 systemd[1]: run-containerd-runc-k8s.io-f1b0cd01527db53878e9a2ed98525219c01e3312a1bb8a726473eedb81f8063d-runc.YxoG3C.mount: Deactivated successfully. Sep 13 00:47:22.366661 kubelet[2611]: I0913 00:47:22.366585 2611 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-755d956888-t5dr5" podStartSLOduration=2.807024097 podStartE2EDuration="5.366564488s" podCreationTimestamp="2025-09-13 00:47:17 +0000 UTC" firstStartedPulling="2025-09-13 00:47:17.618427337 +0000 UTC m=+5.307541329" lastFinishedPulling="2025-09-13 00:47:20.177967723 +0000 UTC m=+7.867081720" observedRunningTime="2025-09-13 00:47:20.592578545 +0000 UTC m=+8.281692546" watchObservedRunningTime="2025-09-13 00:47:22.366564488 +0000 UTC m=+10.055678481" Sep 13 00:47:23.727972 systemd[1]: cri-containerd-f1b0cd01527db53878e9a2ed98525219c01e3312a1bb8a726473eedb81f8063d.scope: Deactivated successfully. Sep 13 00:47:23.727000 audit: BPF prog-id=117 op=UNLOAD Sep 13 00:47:23.730437 kernel: kauditd_printk_skb: 257 callbacks suppressed Sep 13 00:47:23.730674 kernel: audit: type=1334 audit(1757724443.727:852): prog-id=117 op=UNLOAD Sep 13 00:47:23.735000 audit: BPF prog-id=120 op=UNLOAD Sep 13 00:47:23.742582 kernel: audit: type=1334 audit(1757724443.735:853): prog-id=120 op=UNLOAD Sep 13 00:47:23.767717 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f1b0cd01527db53878e9a2ed98525219c01e3312a1bb8a726473eedb81f8063d-rootfs.mount: Deactivated successfully. Sep 13 00:47:23.785797 env[1726]: time="2025-09-13T00:47:23.785751346Z" level=info msg="shim disconnected" id=f1b0cd01527db53878e9a2ed98525219c01e3312a1bb8a726473eedb81f8063d Sep 13 00:47:23.785797 env[1726]: time="2025-09-13T00:47:23.785794290Z" level=warning msg="cleaning up after shim disconnected" id=f1b0cd01527db53878e9a2ed98525219c01e3312a1bb8a726473eedb81f8063d namespace=k8s.io Sep 13 00:47:23.785797 env[1726]: time="2025-09-13T00:47:23.785803932Z" level=info msg="cleaning up dead shim" Sep 13 00:47:23.794697 env[1726]: time="2025-09-13T00:47:23.794652730Z" level=warning msg="cleanup warnings time=\"2025-09-13T00:47:23Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3225 runtime=io.containerd.runc.v2\n" Sep 13 00:47:24.579638 kubelet[2611]: I0913 00:47:24.579607 2611 scope.go:117] "RemoveContainer" containerID="f1b0cd01527db53878e9a2ed98525219c01e3312a1bb8a726473eedb81f8063d" Sep 13 00:47:24.600717 env[1726]: time="2025-09-13T00:47:24.600522640Z" level=info msg="CreateContainer within sandbox \"7d0c343c589d275451dfbf3b4a882cdb6db9272695571d7d8bca34dab99bedcc\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Sep 13 00:47:24.636538 env[1726]: time="2025-09-13T00:47:24.636377284Z" level=info msg="CreateContainer within sandbox \"7d0c343c589d275451dfbf3b4a882cdb6db9272695571d7d8bca34dab99bedcc\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"82e2f89900f8b5342495b987b6419051ce154d36cbbe0bed81347877a1071c50\"" Sep 13 00:47:24.638617 env[1726]: time="2025-09-13T00:47:24.637795639Z" level=info msg="StartContainer for \"82e2f89900f8b5342495b987b6419051ce154d36cbbe0bed81347877a1071c50\"" Sep 13 00:47:24.689476 systemd[1]: Started cri-containerd-82e2f89900f8b5342495b987b6419051ce154d36cbbe0bed81347877a1071c50.scope. Sep 13 00:47:24.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.714577 kernel: audit: type=1400 audit(1757724444.706:854): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.721847 kernel: audit: type=1400 audit(1757724444.706:855): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.738574 kernel: audit: type=1400 audit(1757724444.706:856): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.753771 kernel: audit: type=1400 audit(1757724444.706:857): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.760027 env[1726]: time="2025-09-13T00:47:24.759934243Z" level=info msg="StartContainer for \"82e2f89900f8b5342495b987b6419051ce154d36cbbe0bed81347877a1071c50\" returns successfully" Sep 13 00:47:24.765614 kernel: audit: type=1400 audit(1757724444.706:858): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.768682 systemd[1]: run-containerd-runc-k8s.io-82e2f89900f8b5342495b987b6419051ce154d36cbbe0bed81347877a1071c50-runc.WjluKE.mount: Deactivated successfully. Sep 13 00:47:24.783339 kernel: audit: type=1400 audit(1757724444.706:859): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.783475 kernel: audit: type=1400 audit(1757724444.706:860): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.791562 kernel: audit: type=1400 audit(1757724444.706:861): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.713000 audit: BPF prog-id=121 op=LOAD Sep 13 00:47:24.713000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.713000 audit[3263]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3002 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:24.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832653266383939303066386235333432343935623938376236343139 Sep 13 00:47:24.713000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.713000 audit[3263]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3002 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:24.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832653266383939303066386235333432343935623938376236343139 Sep 13 00:47:24.713000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.713000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.713000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.713000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.713000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.713000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.713000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.713000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.713000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.713000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.713000 audit: BPF prog-id=122 op=LOAD Sep 13 00:47:24.713000 audit[3263]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024be0 items=0 ppid=3002 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:24.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832653266383939303066386235333432343935623938376236343139 Sep 13 00:47:24.714000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.714000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.714000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.714000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.714000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.714000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.714000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.714000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.714000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.714000 audit: BPF prog-id=123 op=LOAD Sep 13 00:47:24.714000 audit[3263]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000024c28 items=0 ppid=3002 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:24.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832653266383939303066386235333432343935623938376236343139 Sep 13 00:47:24.714000 audit: BPF prog-id=123 op=UNLOAD Sep 13 00:47:24.714000 audit: BPF prog-id=122 op=UNLOAD Sep 13 00:47:24.714000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.714000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.714000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.714000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.714000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.714000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.714000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.714000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.714000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.714000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:24.714000 audit: BPF prog-id=124 op=LOAD Sep 13 00:47:24.714000 audit[3263]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025038 items=0 ppid=3002 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:24.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832653266383939303066386235333432343935623938376236343139 Sep 13 00:47:27.171064 sudo[2000]: pam_unix(sudo:session): session closed for user root Sep 13 00:47:27.170000 audit[2000]: USER_END pid=2000 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:47:27.170000 audit[2000]: CRED_DISP pid=2000 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:47:27.201088 sshd[1997]: pam_unix(sshd:session): session closed for user core Sep 13 00:47:27.202000 audit[1997]: USER_END pid=1997 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:47:27.202000 audit[1997]: CRED_DISP pid=1997 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:47:27.210413 systemd[1]: sshd@6-172.31.26.227:22-147.75.109.163:48170.service: Deactivated successfully. Sep 13 00:47:27.210000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.26.227:22-147.75.109.163:48170 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:47:27.211159 systemd[1]: session-7.scope: Deactivated successfully. Sep 13 00:47:27.211305 systemd[1]: session-7.scope: Consumed 4.641s CPU time. Sep 13 00:47:27.211851 systemd-logind[1719]: Session 7 logged out. Waiting for processes to exit. Sep 13 00:47:27.212781 systemd-logind[1719]: Removed session 7. Sep 13 00:47:30.041000 audit[3312]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=3312 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:47:30.043956 kernel: kauditd_printk_skb: 54 callbacks suppressed Sep 13 00:47:30.044092 kernel: audit: type=1325 audit(1757724450.041:877): table=filter:89 family=2 entries=15 op=nft_register_rule pid=3312 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:47:30.041000 audit[3312]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc7e58a670 a2=0 a3=7ffc7e58a65c items=0 ppid=2978 pid=3312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:30.059271 kernel: audit: type=1300 audit(1757724450.041:877): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc7e58a670 a2=0 a3=7ffc7e58a65c items=0 ppid=2978 pid=3312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:30.041000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:47:30.069571 kernel: audit: type=1327 audit(1757724450.041:877): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:47:30.071000 audit[3312]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=3312 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:47:30.082576 kernel: audit: type=1325 audit(1757724450.071:878): table=nat:90 family=2 entries=12 op=nft_register_rule pid=3312 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:47:30.071000 audit[3312]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc7e58a670 a2=0 a3=0 items=0 ppid=2978 pid=3312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:30.094567 kernel: audit: type=1300 audit(1757724450.071:878): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc7e58a670 a2=0 a3=0 items=0 ppid=2978 pid=3312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:30.071000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:47:30.101567 kernel: audit: type=1327 audit(1757724450.071:878): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:47:30.112000 audit[3314]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=3314 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:47:30.112000 audit[3314]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe9ef95850 a2=0 a3=7ffe9ef9583c items=0 ppid=2978 pid=3314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:30.130065 kernel: audit: type=1325 audit(1757724450.112:879): table=filter:91 family=2 entries=16 op=nft_register_rule pid=3314 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:47:30.130210 kernel: audit: type=1300 audit(1757724450.112:879): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe9ef95850 a2=0 a3=7ffe9ef9583c items=0 ppid=2978 pid=3314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:30.112000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:47:30.140569 kernel: audit: type=1327 audit(1757724450.112:879): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:47:30.141000 audit[3314]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=3314 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:47:30.141000 audit[3314]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe9ef95850 a2=0 a3=0 items=0 ppid=2978 pid=3314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:30.141000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:47:30.147564 kernel: audit: type=1325 audit(1757724450.141:880): table=nat:92 family=2 entries=12 op=nft_register_rule pid=3314 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:47:33.337000 audit[3317]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=3317 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:47:33.337000 audit[3317]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffe5bf903c0 a2=0 a3=7ffe5bf903ac items=0 ppid=2978 pid=3317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:33.337000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:47:33.341000 audit[3317]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=3317 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:47:33.341000 audit[3317]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe5bf903c0 a2=0 a3=0 items=0 ppid=2978 pid=3317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:33.341000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:47:33.362000 audit[3319]: NETFILTER_CFG table=filter:95 family=2 entries=18 op=nft_register_rule pid=3319 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:47:33.362000 audit[3319]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffcf5dcd520 a2=0 a3=7ffcf5dcd50c items=0 ppid=2978 pid=3319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:33.362000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:47:33.369000 audit[3319]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=3319 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:47:33.369000 audit[3319]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcf5dcd520 a2=0 a3=0 items=0 ppid=2978 pid=3319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:33.369000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:47:33.439849 systemd[1]: Created slice kubepods-besteffort-podf8ebebdd_ecc8_4fbb_b265_c9b697ac864f.slice. Sep 13 00:47:33.558738 kubelet[2611]: I0913 00:47:33.558684 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/f8ebebdd-ecc8-4fbb-b265-c9b697ac864f-typha-certs\") pod \"calico-typha-5966846d49-v6jmg\" (UID: \"f8ebebdd-ecc8-4fbb-b265-c9b697ac864f\") " pod="calico-system/calico-typha-5966846d49-v6jmg" Sep 13 00:47:33.559434 kubelet[2611]: I0913 00:47:33.559390 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f8ebebdd-ecc8-4fbb-b265-c9b697ac864f-tigera-ca-bundle\") pod \"calico-typha-5966846d49-v6jmg\" (UID: \"f8ebebdd-ecc8-4fbb-b265-c9b697ac864f\") " pod="calico-system/calico-typha-5966846d49-v6jmg" Sep 13 00:47:33.559660 kubelet[2611]: I0913 00:47:33.559639 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-spwrs\" (UniqueName: \"kubernetes.io/projected/f8ebebdd-ecc8-4fbb-b265-c9b697ac864f-kube-api-access-spwrs\") pod \"calico-typha-5966846d49-v6jmg\" (UID: \"f8ebebdd-ecc8-4fbb-b265-c9b697ac864f\") " pod="calico-system/calico-typha-5966846d49-v6jmg" Sep 13 00:47:33.685746 systemd[1]: Created slice kubepods-besteffort-pod27445306_9347_46a9_80b8_2b4e499ed7f2.slice. Sep 13 00:47:33.744314 env[1726]: time="2025-09-13T00:47:33.744266067Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5966846d49-v6jmg,Uid:f8ebebdd-ecc8-4fbb-b265-c9b697ac864f,Namespace:calico-system,Attempt:0,}" Sep 13 00:47:33.766296 kubelet[2611]: I0913 00:47:33.765780 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/27445306-9347-46a9-80b8-2b4e499ed7f2-flexvol-driver-host\") pod \"calico-node-s8nmf\" (UID: \"27445306-9347-46a9-80b8-2b4e499ed7f2\") " pod="calico-system/calico-node-s8nmf" Sep 13 00:47:33.766296 kubelet[2611]: I0913 00:47:33.765818 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/27445306-9347-46a9-80b8-2b4e499ed7f2-var-run-calico\") pod \"calico-node-s8nmf\" (UID: \"27445306-9347-46a9-80b8-2b4e499ed7f2\") " pod="calico-system/calico-node-s8nmf" Sep 13 00:47:33.766296 kubelet[2611]: I0913 00:47:33.765837 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/27445306-9347-46a9-80b8-2b4e499ed7f2-cni-log-dir\") pod \"calico-node-s8nmf\" (UID: \"27445306-9347-46a9-80b8-2b4e499ed7f2\") " pod="calico-system/calico-node-s8nmf" Sep 13 00:47:33.766296 kubelet[2611]: I0913 00:47:33.765853 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/27445306-9347-46a9-80b8-2b4e499ed7f2-tigera-ca-bundle\") pod \"calico-node-s8nmf\" (UID: \"27445306-9347-46a9-80b8-2b4e499ed7f2\") " pod="calico-system/calico-node-s8nmf" Sep 13 00:47:33.766296 kubelet[2611]: I0913 00:47:33.765868 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/27445306-9347-46a9-80b8-2b4e499ed7f2-var-lib-calico\") pod \"calico-node-s8nmf\" (UID: \"27445306-9347-46a9-80b8-2b4e499ed7f2\") " pod="calico-system/calico-node-s8nmf" Sep 13 00:47:33.766561 kubelet[2611]: I0913 00:47:33.765885 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/27445306-9347-46a9-80b8-2b4e499ed7f2-lib-modules\") pod \"calico-node-s8nmf\" (UID: \"27445306-9347-46a9-80b8-2b4e499ed7f2\") " pod="calico-system/calico-node-s8nmf" Sep 13 00:47:33.766561 kubelet[2611]: I0913 00:47:33.765905 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/27445306-9347-46a9-80b8-2b4e499ed7f2-node-certs\") pod \"calico-node-s8nmf\" (UID: \"27445306-9347-46a9-80b8-2b4e499ed7f2\") " pod="calico-system/calico-node-s8nmf" Sep 13 00:47:33.766561 kubelet[2611]: I0913 00:47:33.765924 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sgf6m\" (UniqueName: \"kubernetes.io/projected/27445306-9347-46a9-80b8-2b4e499ed7f2-kube-api-access-sgf6m\") pod \"calico-node-s8nmf\" (UID: \"27445306-9347-46a9-80b8-2b4e499ed7f2\") " pod="calico-system/calico-node-s8nmf" Sep 13 00:47:33.766561 kubelet[2611]: I0913 00:47:33.765939 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/27445306-9347-46a9-80b8-2b4e499ed7f2-xtables-lock\") pod \"calico-node-s8nmf\" (UID: \"27445306-9347-46a9-80b8-2b4e499ed7f2\") " pod="calico-system/calico-node-s8nmf" Sep 13 00:47:33.766561 kubelet[2611]: I0913 00:47:33.765954 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/27445306-9347-46a9-80b8-2b4e499ed7f2-cni-bin-dir\") pod \"calico-node-s8nmf\" (UID: \"27445306-9347-46a9-80b8-2b4e499ed7f2\") " pod="calico-system/calico-node-s8nmf" Sep 13 00:47:33.766706 kubelet[2611]: I0913 00:47:33.765968 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/27445306-9347-46a9-80b8-2b4e499ed7f2-cni-net-dir\") pod \"calico-node-s8nmf\" (UID: \"27445306-9347-46a9-80b8-2b4e499ed7f2\") " pod="calico-system/calico-node-s8nmf" Sep 13 00:47:33.766706 kubelet[2611]: I0913 00:47:33.765987 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/27445306-9347-46a9-80b8-2b4e499ed7f2-policysync\") pod \"calico-node-s8nmf\" (UID: \"27445306-9347-46a9-80b8-2b4e499ed7f2\") " pod="calico-system/calico-node-s8nmf" Sep 13 00:47:33.772275 env[1726]: time="2025-09-13T00:47:33.772199063Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:47:33.772419 env[1726]: time="2025-09-13T00:47:33.772239763Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:47:33.772419 env[1726]: time="2025-09-13T00:47:33.772269512Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:47:33.772748 env[1726]: time="2025-09-13T00:47:33.772692557Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8a74807970a47a40d67a4fed8120f4bde2167e4045cbecbc88ff57d1dcf50b04 pid=3329 runtime=io.containerd.runc.v2 Sep 13 00:47:33.801808 systemd[1]: Started cri-containerd-8a74807970a47a40d67a4fed8120f4bde2167e4045cbecbc88ff57d1dcf50b04.scope. Sep 13 00:47:33.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:33.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:33.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:33.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:33.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:33.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:33.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:33.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:33.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:33.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:33.824000 audit: BPF prog-id=125 op=LOAD Sep 13 00:47:33.824000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:33.824000 audit[3339]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3329 pid=3339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:33.824000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861373438303739373061343761343064363761346665643831323066 Sep 13 00:47:33.824000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:33.824000 audit[3339]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=3329 pid=3339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:33.824000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861373438303739373061343761343064363761346665643831323066 Sep 13 00:47:33.824000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:33.824000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:33.824000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:33.824000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:33.824000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:33.824000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:33.824000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:33.824000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:33.824000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:33.824000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:33.824000 audit: BPF prog-id=126 op=LOAD Sep 13 00:47:33.824000 audit[3339]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000245eb0 items=0 ppid=3329 pid=3339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:33.824000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861373438303739373061343761343064363761346665643831323066 Sep 13 00:47:33.824000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:33.824000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:33.824000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:33.824000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:33.824000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:33.824000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:33.824000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:33.824000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:33.824000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:33.824000 audit: BPF prog-id=127 op=LOAD Sep 13 00:47:33.824000 audit[3339]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000245ef8 items=0 ppid=3329 pid=3339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:33.824000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861373438303739373061343761343064363761346665643831323066 Sep 13 00:47:33.825000 audit: BPF prog-id=127 op=UNLOAD Sep 13 00:47:33.825000 audit: BPF prog-id=126 op=UNLOAD Sep 13 00:47:33.825000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:33.825000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:33.825000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:33.825000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:33.825000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:33.825000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:33.825000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:33.825000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:33.825000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:33.825000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:33.825000 audit: BPF prog-id=128 op=LOAD Sep 13 00:47:33.825000 audit[3339]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0003b8308 items=0 ppid=3329 pid=3339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:33.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861373438303739373061343761343064363761346665643831323066 Sep 13 00:47:33.882515 kubelet[2611]: E0913 00:47:33.882453 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:33.882515 kubelet[2611]: W0913 00:47:33.882506 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:33.884010 kubelet[2611]: E0913 00:47:33.883971 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:33.884671 env[1726]: time="2025-09-13T00:47:33.884628218Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5966846d49-v6jmg,Uid:f8ebebdd-ecc8-4fbb-b265-c9b697ac864f,Namespace:calico-system,Attempt:0,} returns sandbox id \"8a74807970a47a40d67a4fed8120f4bde2167e4045cbecbc88ff57d1dcf50b04\"" Sep 13 00:47:33.888452 env[1726]: time="2025-09-13T00:47:33.888404726Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.3\"" Sep 13 00:47:33.901202 kubelet[2611]: E0913 00:47:33.901166 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:33.901202 kubelet[2611]: W0913 00:47:33.901190 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:33.901423 kubelet[2611]: E0913 00:47:33.901216 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.001878 env[1726]: time="2025-09-13T00:47:34.001756094Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-s8nmf,Uid:27445306-9347-46a9-80b8-2b4e499ed7f2,Namespace:calico-system,Attempt:0,}" Sep 13 00:47:34.008089 kubelet[2611]: E0913 00:47:34.008041 2611 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gqprd" podUID="a9acc916-f8c5-498e-a936-eb42d96a2962" Sep 13 00:47:34.028536 kubelet[2611]: E0913 00:47:34.028504 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.028536 kubelet[2611]: W0913 00:47:34.028530 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.028720 kubelet[2611]: E0913 00:47:34.028585 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.028771 kubelet[2611]: E0913 00:47:34.028752 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.028771 kubelet[2611]: W0913 00:47:34.028759 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.028771 kubelet[2611]: E0913 00:47:34.028767 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.028924 kubelet[2611]: E0913 00:47:34.028900 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.028924 kubelet[2611]: W0913 00:47:34.028914 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.028924 kubelet[2611]: E0913 00:47:34.028921 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.029114 kubelet[2611]: E0913 00:47:34.029100 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.029114 kubelet[2611]: W0913 00:47:34.029113 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.029185 kubelet[2611]: E0913 00:47:34.029121 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.029277 kubelet[2611]: E0913 00:47:34.029265 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.029277 kubelet[2611]: W0913 00:47:34.029276 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.029348 kubelet[2611]: E0913 00:47:34.029283 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.029419 kubelet[2611]: E0913 00:47:34.029408 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.029419 kubelet[2611]: W0913 00:47:34.029418 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.029484 kubelet[2611]: E0913 00:47:34.029425 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.029579 kubelet[2611]: E0913 00:47:34.029568 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.029579 kubelet[2611]: W0913 00:47:34.029578 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.029654 kubelet[2611]: E0913 00:47:34.029586 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.029741 kubelet[2611]: E0913 00:47:34.029730 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.029741 kubelet[2611]: W0913 00:47:34.029741 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.029814 kubelet[2611]: E0913 00:47:34.029747 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.029895 kubelet[2611]: E0913 00:47:34.029884 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.029895 kubelet[2611]: W0913 00:47:34.029894 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.029965 kubelet[2611]: E0913 00:47:34.029901 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.030038 kubelet[2611]: E0913 00:47:34.030026 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.030038 kubelet[2611]: W0913 00:47:34.030037 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.030104 kubelet[2611]: E0913 00:47:34.030044 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.030187 kubelet[2611]: E0913 00:47:34.030176 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.030187 kubelet[2611]: W0913 00:47:34.030186 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.030254 kubelet[2611]: E0913 00:47:34.030193 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.030671 kubelet[2611]: E0913 00:47:34.030651 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.030671 kubelet[2611]: W0913 00:47:34.030670 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.030781 kubelet[2611]: E0913 00:47:34.030683 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.030849 kubelet[2611]: E0913 00:47:34.030832 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.030849 kubelet[2611]: W0913 00:47:34.030843 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.030913 kubelet[2611]: E0913 00:47:34.030850 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.030989 kubelet[2611]: E0913 00:47:34.030977 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.030989 kubelet[2611]: W0913 00:47:34.030988 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.031058 kubelet[2611]: E0913 00:47:34.030995 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.031169 kubelet[2611]: E0913 00:47:34.031118 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.031169 kubelet[2611]: W0913 00:47:34.031126 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.031169 kubelet[2611]: E0913 00:47:34.031132 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.031271 kubelet[2611]: E0913 00:47:34.031258 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.031271 kubelet[2611]: W0913 00:47:34.031269 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.031337 kubelet[2611]: E0913 00:47:34.031276 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.031452 kubelet[2611]: E0913 00:47:34.031410 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.031452 kubelet[2611]: W0913 00:47:34.031418 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.031452 kubelet[2611]: E0913 00:47:34.031424 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.032057 kubelet[2611]: E0913 00:47:34.031561 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.032057 kubelet[2611]: W0913 00:47:34.031571 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.032057 kubelet[2611]: E0913 00:47:34.031578 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.032057 kubelet[2611]: E0913 00:47:34.031711 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.032057 kubelet[2611]: W0913 00:47:34.031719 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.032057 kubelet[2611]: E0913 00:47:34.031728 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.032057 kubelet[2611]: E0913 00:47:34.031884 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.032057 kubelet[2611]: W0913 00:47:34.031890 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.032057 kubelet[2611]: E0913 00:47:34.031898 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.039496 env[1726]: time="2025-09-13T00:47:34.039156749Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:47:34.039496 env[1726]: time="2025-09-13T00:47:34.039203225Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:47:34.039496 env[1726]: time="2025-09-13T00:47:34.039228898Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:47:34.039496 env[1726]: time="2025-09-13T00:47:34.039403783Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/31bf4da5de20d520cbb0fbc64a26d0a7377993f7db865ee8117dd3d49cc17e0c pid=3393 runtime=io.containerd.runc.v2 Sep 13 00:47:34.069011 kubelet[2611]: E0913 00:47:34.068979 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.069011 kubelet[2611]: W0913 00:47:34.069006 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.069167 kubelet[2611]: E0913 00:47:34.069028 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.069167 kubelet[2611]: I0913 00:47:34.069060 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/a9acc916-f8c5-498e-a936-eb42d96a2962-socket-dir\") pod \"csi-node-driver-gqprd\" (UID: \"a9acc916-f8c5-498e-a936-eb42d96a2962\") " pod="calico-system/csi-node-driver-gqprd" Sep 13 00:47:34.069328 kubelet[2611]: E0913 00:47:34.069311 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.069375 kubelet[2611]: W0913 00:47:34.069329 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.069375 kubelet[2611]: E0913 00:47:34.069345 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.069375 kubelet[2611]: I0913 00:47:34.069362 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jhz7t\" (UniqueName: \"kubernetes.io/projected/a9acc916-f8c5-498e-a936-eb42d96a2962-kube-api-access-jhz7t\") pod \"csi-node-driver-gqprd\" (UID: \"a9acc916-f8c5-498e-a936-eb42d96a2962\") " pod="calico-system/csi-node-driver-gqprd" Sep 13 00:47:34.069885 kubelet[2611]: E0913 00:47:34.069572 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.069885 kubelet[2611]: W0913 00:47:34.069583 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.069885 kubelet[2611]: E0913 00:47:34.069595 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.069885 kubelet[2611]: I0913 00:47:34.069610 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/a9acc916-f8c5-498e-a936-eb42d96a2962-varrun\") pod \"csi-node-driver-gqprd\" (UID: \"a9acc916-f8c5-498e-a936-eb42d96a2962\") " pod="calico-system/csi-node-driver-gqprd" Sep 13 00:47:34.069885 kubelet[2611]: E0913 00:47:34.069796 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.069885 kubelet[2611]: W0913 00:47:34.069805 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.069885 kubelet[2611]: E0913 00:47:34.069823 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.069885 kubelet[2611]: I0913 00:47:34.069838 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/a9acc916-f8c5-498e-a936-eb42d96a2962-registration-dir\") pod \"csi-node-driver-gqprd\" (UID: \"a9acc916-f8c5-498e-a936-eb42d96a2962\") " pod="calico-system/csi-node-driver-gqprd" Sep 13 00:47:34.070156 kubelet[2611]: E0913 00:47:34.070059 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.070156 kubelet[2611]: W0913 00:47:34.070069 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.070156 kubelet[2611]: E0913 00:47:34.070082 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.070156 kubelet[2611]: I0913 00:47:34.070097 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/a9acc916-f8c5-498e-a936-eb42d96a2962-kubelet-dir\") pod \"csi-node-driver-gqprd\" (UID: \"a9acc916-f8c5-498e-a936-eb42d96a2962\") " pod="calico-system/csi-node-driver-gqprd" Sep 13 00:47:34.071396 kubelet[2611]: E0913 00:47:34.070288 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.071396 kubelet[2611]: W0913 00:47:34.070298 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.071396 kubelet[2611]: E0913 00:47:34.070308 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.071396 kubelet[2611]: E0913 00:47:34.070592 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.071396 kubelet[2611]: W0913 00:47:34.070605 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.071396 kubelet[2611]: E0913 00:47:34.070673 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.071396 kubelet[2611]: E0913 00:47:34.070777 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.071396 kubelet[2611]: W0913 00:47:34.070783 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.071396 kubelet[2611]: E0913 00:47:34.070854 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.071396 kubelet[2611]: E0913 00:47:34.070944 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.071821 kubelet[2611]: W0913 00:47:34.070950 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.071821 kubelet[2611]: E0913 00:47:34.071040 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.071821 kubelet[2611]: E0913 00:47:34.071130 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.071821 kubelet[2611]: W0913 00:47:34.071135 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.071821 kubelet[2611]: E0913 00:47:34.071202 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.071821 kubelet[2611]: E0913 00:47:34.071289 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.071821 kubelet[2611]: W0913 00:47:34.071295 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.071821 kubelet[2611]: E0913 00:47:34.071351 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.071821 kubelet[2611]: E0913 00:47:34.071443 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.071821 kubelet[2611]: W0913 00:47:34.071448 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.072072 kubelet[2611]: E0913 00:47:34.071454 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.072072 kubelet[2611]: E0913 00:47:34.071619 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.072072 kubelet[2611]: W0913 00:47:34.071625 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.072072 kubelet[2611]: E0913 00:47:34.071633 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.072072 kubelet[2611]: E0913 00:47:34.071829 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.072072 kubelet[2611]: W0913 00:47:34.071837 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.072072 kubelet[2611]: E0913 00:47:34.071846 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.072249 kubelet[2611]: E0913 00:47:34.072092 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.072249 kubelet[2611]: W0913 00:47:34.072098 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.072249 kubelet[2611]: E0913 00:47:34.072106 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.077209 systemd[1]: Started cri-containerd-31bf4da5de20d520cbb0fbc64a26d0a7377993f7db865ee8117dd3d49cc17e0c.scope. Sep 13 00:47:34.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:34.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:34.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:34.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:34.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:34.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:34.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:34.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:34.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:34.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:34.098000 audit: BPF prog-id=129 op=LOAD Sep 13 00:47:34.098000 audit[3405]: AVC avc: denied { bpf } for pid=3405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:34.098000 audit[3405]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3393 pid=3405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:34.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331626634646135646532306435323063626230666263363461323664 Sep 13 00:47:34.098000 audit[3405]: AVC avc: denied { perfmon } for pid=3405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:34.098000 audit[3405]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3393 pid=3405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:34.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331626634646135646532306435323063626230666263363461323664 Sep 13 00:47:34.098000 audit[3405]: AVC avc: denied { bpf } for pid=3405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:34.098000 audit[3405]: AVC avc: denied { bpf } for pid=3405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:34.098000 audit[3405]: AVC avc: denied { bpf } for pid=3405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:34.098000 audit[3405]: AVC avc: denied { perfmon } for pid=3405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:34.098000 audit[3405]: AVC avc: denied { perfmon } for pid=3405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:34.098000 audit[3405]: AVC avc: denied { perfmon } for pid=3405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:34.098000 audit[3405]: AVC avc: denied { perfmon } for pid=3405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:34.098000 audit[3405]: AVC avc: denied { perfmon } for pid=3405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:34.098000 audit[3405]: AVC avc: denied { bpf } for pid=3405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:34.098000 audit[3405]: AVC avc: denied { bpf } for pid=3405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:34.098000 audit: BPF prog-id=130 op=LOAD Sep 13 00:47:34.098000 audit[3405]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002cfde0 items=0 ppid=3393 pid=3405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:34.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331626634646135646532306435323063626230666263363461323664 Sep 13 00:47:34.099000 audit[3405]: AVC avc: denied { bpf } for pid=3405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:34.099000 audit[3405]: AVC avc: denied { bpf } for pid=3405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:34.099000 audit[3405]: AVC avc: denied { perfmon } for pid=3405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:34.099000 audit[3405]: AVC avc: denied { perfmon } for pid=3405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:34.099000 audit[3405]: AVC avc: denied { perfmon } for pid=3405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:34.099000 audit[3405]: AVC avc: denied { perfmon } for pid=3405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:34.099000 audit[3405]: AVC avc: denied { perfmon } for pid=3405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:34.099000 audit[3405]: AVC avc: denied { bpf } for pid=3405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:34.099000 audit[3405]: AVC avc: denied { bpf } for pid=3405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:34.099000 audit: BPF prog-id=131 op=LOAD Sep 13 00:47:34.099000 audit[3405]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002cfe28 items=0 ppid=3393 pid=3405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:34.099000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331626634646135646532306435323063626230666263363461323664 Sep 13 00:47:34.099000 audit: BPF prog-id=131 op=UNLOAD Sep 13 00:47:34.099000 audit: BPF prog-id=130 op=UNLOAD Sep 13 00:47:34.099000 audit[3405]: AVC avc: denied { bpf } for pid=3405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:34.099000 audit[3405]: AVC avc: denied { bpf } for pid=3405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:34.099000 audit[3405]: AVC avc: denied { bpf } for pid=3405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:34.099000 audit[3405]: AVC avc: denied { perfmon } for pid=3405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:34.099000 audit[3405]: AVC avc: denied { perfmon } for pid=3405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:34.099000 audit[3405]: AVC avc: denied { perfmon } for pid=3405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:34.099000 audit[3405]: AVC avc: denied { perfmon } for pid=3405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:34.099000 audit[3405]: AVC avc: denied { perfmon } for pid=3405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:34.099000 audit[3405]: AVC avc: denied { bpf } for pid=3405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:34.099000 audit[3405]: AVC avc: denied { bpf } for pid=3405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:34.099000 audit: BPF prog-id=132 op=LOAD Sep 13 00:47:34.099000 audit[3405]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003b4238 items=0 ppid=3393 pid=3405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:34.099000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331626634646135646532306435323063626230666263363461323664 Sep 13 00:47:34.116164 env[1726]: time="2025-09-13T00:47:34.116116831Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-s8nmf,Uid:27445306-9347-46a9-80b8-2b4e499ed7f2,Namespace:calico-system,Attempt:0,} returns sandbox id \"31bf4da5de20d520cbb0fbc64a26d0a7377993f7db865ee8117dd3d49cc17e0c\"" Sep 13 00:47:34.171159 kubelet[2611]: E0913 00:47:34.171123 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.171159 kubelet[2611]: W0913 00:47:34.171151 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.171512 kubelet[2611]: E0913 00:47:34.171176 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.171600 kubelet[2611]: E0913 00:47:34.171526 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.171600 kubelet[2611]: W0913 00:47:34.171563 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.171600 kubelet[2611]: E0913 00:47:34.171584 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.172045 kubelet[2611]: E0913 00:47:34.172008 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.172045 kubelet[2611]: W0913 00:47:34.172025 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.172045 kubelet[2611]: E0913 00:47:34.172045 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.172325 kubelet[2611]: E0913 00:47:34.172300 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.172325 kubelet[2611]: W0913 00:47:34.172311 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.172431 kubelet[2611]: E0913 00:47:34.172328 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.172613 kubelet[2611]: E0913 00:47:34.172594 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.172613 kubelet[2611]: W0913 00:47:34.172611 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.172748 kubelet[2611]: E0913 00:47:34.172704 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.172905 kubelet[2611]: E0913 00:47:34.172886 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.172905 kubelet[2611]: W0913 00:47:34.172898 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.173042 kubelet[2611]: E0913 00:47:34.172988 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.173141 kubelet[2611]: E0913 00:47:34.173126 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.173222 kubelet[2611]: W0913 00:47:34.173142 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.173281 kubelet[2611]: E0913 00:47:34.173234 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.173439 kubelet[2611]: E0913 00:47:34.173425 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.173520 kubelet[2611]: W0913 00:47:34.173440 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.173520 kubelet[2611]: E0913 00:47:34.173458 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.173718 kubelet[2611]: E0913 00:47:34.173703 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.173790 kubelet[2611]: W0913 00:47:34.173718 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.173841 kubelet[2611]: E0913 00:47:34.173811 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.173961 kubelet[2611]: E0913 00:47:34.173948 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.174036 kubelet[2611]: W0913 00:47:34.173963 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.174180 kubelet[2611]: E0913 00:47:34.174163 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.174335 kubelet[2611]: E0913 00:47:34.174315 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.174335 kubelet[2611]: W0913 00:47:34.174330 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.174460 kubelet[2611]: E0913 00:47:34.174420 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.174600 kubelet[2611]: E0913 00:47:34.174588 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.174682 kubelet[2611]: W0913 00:47:34.174602 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.174746 kubelet[2611]: E0913 00:47:34.174691 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.174858 kubelet[2611]: E0913 00:47:34.174828 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.174858 kubelet[2611]: W0913 00:47:34.174838 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.174972 kubelet[2611]: E0913 00:47:34.174919 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.175058 kubelet[2611]: E0913 00:47:34.175045 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.175140 kubelet[2611]: W0913 00:47:34.175059 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.175215 kubelet[2611]: E0913 00:47:34.175144 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.175297 kubelet[2611]: E0913 00:47:34.175284 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.175379 kubelet[2611]: W0913 00:47:34.175298 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.175379 kubelet[2611]: E0913 00:47:34.175314 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.175536 kubelet[2611]: E0913 00:47:34.175522 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.175640 kubelet[2611]: W0913 00:47:34.175540 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.175818 kubelet[2611]: E0913 00:47:34.175641 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.175818 kubelet[2611]: E0913 00:47:34.175792 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.175818 kubelet[2611]: W0913 00:47:34.175801 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.175988 kubelet[2611]: E0913 00:47:34.175891 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.176041 kubelet[2611]: E0913 00:47:34.176023 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.176041 kubelet[2611]: W0913 00:47:34.176032 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.176138 kubelet[2611]: E0913 00:47:34.176114 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.176297 kubelet[2611]: E0913 00:47:34.176262 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.176297 kubelet[2611]: W0913 00:47:34.176277 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.176424 kubelet[2611]: E0913 00:47:34.176408 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.176632 kubelet[2611]: E0913 00:47:34.176618 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.176724 kubelet[2611]: W0913 00:47:34.176633 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.176789 kubelet[2611]: E0913 00:47:34.176751 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.177293 kubelet[2611]: E0913 00:47:34.177275 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.177293 kubelet[2611]: W0913 00:47:34.177293 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.177481 kubelet[2611]: E0913 00:47:34.177310 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.178756 kubelet[2611]: E0913 00:47:34.178722 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.178756 kubelet[2611]: W0913 00:47:34.178739 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.178942 kubelet[2611]: E0913 00:47:34.178757 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.179058 kubelet[2611]: E0913 00:47:34.179042 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.179158 kubelet[2611]: W0913 00:47:34.179059 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.179227 kubelet[2611]: E0913 00:47:34.179181 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.179351 kubelet[2611]: E0913 00:47:34.179337 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.179437 kubelet[2611]: W0913 00:47:34.179352 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.179594 kubelet[2611]: E0913 00:47:34.179461 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.179678 kubelet[2611]: E0913 00:47:34.179618 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.179678 kubelet[2611]: W0913 00:47:34.179628 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.179678 kubelet[2611]: E0913 00:47:34.179642 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.200053 kubelet[2611]: E0913 00:47:34.199952 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:34.200053 kubelet[2611]: W0913 00:47:34.199977 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:34.200053 kubelet[2611]: E0913 00:47:34.200003 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:34.383000 audit[3473]: NETFILTER_CFG table=filter:97 family=2 entries=20 op=nft_register_rule pid=3473 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:47:34.383000 audit[3473]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7fffb65941b0 a2=0 a3=7fffb659419c items=0 ppid=2978 pid=3473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:34.383000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:47:34.387000 audit[3473]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=3473 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:47:34.387000 audit[3473]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffb65941b0 a2=0 a3=0 items=0 ppid=2978 pid=3473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:34.387000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:47:34.670961 systemd[1]: run-containerd-runc-k8s.io-8a74807970a47a40d67a4fed8120f4bde2167e4045cbecbc88ff57d1dcf50b04-runc.H4sI3A.mount: Deactivated successfully. Sep 13 00:47:35.213587 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2108168949.mount: Deactivated successfully. Sep 13 00:47:35.492643 kubelet[2611]: E0913 00:47:35.491966 2611 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gqprd" podUID="a9acc916-f8c5-498e-a936-eb42d96a2962" Sep 13 00:47:36.523029 env[1726]: time="2025-09-13T00:47:36.522978531Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:36.528639 env[1726]: time="2025-09-13T00:47:36.528144985Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1d7bb7b0cce2924d35c7c26f6b6600409ea7c9535074c3d2e517ffbb3a0e0b36,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:36.532205 env[1726]: time="2025-09-13T00:47:36.532085092Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:36.535966 env[1726]: time="2025-09-13T00:47:36.535918264Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f4a3d61ffda9c98a53adeb412c5af404ca3727a3cc2d0b4ef28d197bdd47ecaa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:36.536576 env[1726]: time="2025-09-13T00:47:36.536522162Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.3\" returns image reference \"sha256:1d7bb7b0cce2924d35c7c26f6b6600409ea7c9535074c3d2e517ffbb3a0e0b36\"" Sep 13 00:47:36.537998 env[1726]: time="2025-09-13T00:47:36.537974804Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\"" Sep 13 00:47:36.557136 env[1726]: time="2025-09-13T00:47:36.557079938Z" level=info msg="CreateContainer within sandbox \"8a74807970a47a40d67a4fed8120f4bde2167e4045cbecbc88ff57d1dcf50b04\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Sep 13 00:47:36.576163 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1230356309.mount: Deactivated successfully. Sep 13 00:47:36.589111 env[1726]: time="2025-09-13T00:47:36.589058082Z" level=info msg="CreateContainer within sandbox \"8a74807970a47a40d67a4fed8120f4bde2167e4045cbecbc88ff57d1dcf50b04\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"d3024486e92c2463f6b9bee85649673e98061f0706c1e94f81b7dde7aa99b3a7\"" Sep 13 00:47:36.590884 env[1726]: time="2025-09-13T00:47:36.589782131Z" level=info msg="StartContainer for \"d3024486e92c2463f6b9bee85649673e98061f0706c1e94f81b7dde7aa99b3a7\"" Sep 13 00:47:36.614292 systemd[1]: Started cri-containerd-d3024486e92c2463f6b9bee85649673e98061f0706c1e94f81b7dde7aa99b3a7.scope. Sep 13 00:47:36.645299 kernel: kauditd_printk_skb: 134 callbacks suppressed Sep 13 00:47:36.645471 kernel: audit: type=1400 audit(1757724456.635:923): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.661929 kernel: audit: type=1400 audit(1757724456.635:924): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.662028 kernel: audit: type=1400 audit(1757724456.635:925): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.669379 kernel: audit: type=1400 audit(1757724456.635:926): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.684472 kernel: audit: type=1400 audit(1757724456.635:927): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.684630 kernel: audit: type=1400 audit(1757724456.635:928): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.692580 kernel: audit: type=1400 audit(1757724456.635:929): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.700563 kernel: audit: type=1400 audit(1757724456.635:930): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.708686 kernel: audit: type=1400 audit(1757724456.635:931): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.716728 kernel: audit: type=1400 audit(1757724456.644:932): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.644000 audit: BPF prog-id=133 op=LOAD Sep 13 00:47:36.645000 audit[3483]: AVC avc: denied { bpf } for pid=3483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.645000 audit[3483]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3329 pid=3483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:36.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433303234343836653932633234363366366239626565383536343936 Sep 13 00:47:36.645000 audit[3483]: AVC avc: denied { perfmon } for pid=3483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.645000 audit[3483]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3329 pid=3483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:36.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433303234343836653932633234363366366239626565383536343936 Sep 13 00:47:36.645000 audit[3483]: AVC avc: denied { bpf } for pid=3483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.645000 audit[3483]: AVC avc: denied { bpf } for pid=3483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.645000 audit[3483]: AVC avc: denied { bpf } for pid=3483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.645000 audit[3483]: AVC avc: denied { perfmon } for pid=3483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.645000 audit[3483]: AVC avc: denied { perfmon } for pid=3483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.645000 audit[3483]: AVC avc: denied { perfmon } for pid=3483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.645000 audit[3483]: AVC avc: denied { perfmon } for pid=3483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.645000 audit[3483]: AVC avc: denied { perfmon } for pid=3483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.645000 audit[3483]: AVC avc: denied { bpf } for pid=3483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.645000 audit[3483]: AVC avc: denied { bpf } for pid=3483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.645000 audit: BPF prog-id=134 op=LOAD Sep 13 00:47:36.645000 audit[3483]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002d3d10 items=0 ppid=3329 pid=3483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:36.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433303234343836653932633234363366366239626565383536343936 Sep 13 00:47:36.646000 audit[3483]: AVC avc: denied { bpf } for pid=3483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.646000 audit[3483]: AVC avc: denied { bpf } for pid=3483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.646000 audit[3483]: AVC avc: denied { perfmon } for pid=3483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.646000 audit[3483]: AVC avc: denied { perfmon } for pid=3483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.646000 audit[3483]: AVC avc: denied { perfmon } for pid=3483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.646000 audit[3483]: AVC avc: denied { perfmon } for pid=3483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.646000 audit[3483]: AVC avc: denied { perfmon } for pid=3483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.646000 audit[3483]: AVC avc: denied { bpf } for pid=3483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.646000 audit[3483]: AVC avc: denied { bpf } for pid=3483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.646000 audit: BPF prog-id=135 op=LOAD Sep 13 00:47:36.646000 audit[3483]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002d3d58 items=0 ppid=3329 pid=3483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:36.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433303234343836653932633234363366366239626565383536343936 Sep 13 00:47:36.646000 audit: BPF prog-id=135 op=UNLOAD Sep 13 00:47:36.646000 audit: BPF prog-id=134 op=UNLOAD Sep 13 00:47:36.646000 audit[3483]: AVC avc: denied { bpf } for pid=3483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.646000 audit[3483]: AVC avc: denied { bpf } for pid=3483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.646000 audit[3483]: AVC avc: denied { bpf } for pid=3483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.646000 audit[3483]: AVC avc: denied { perfmon } for pid=3483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.646000 audit[3483]: AVC avc: denied { perfmon } for pid=3483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.646000 audit[3483]: AVC avc: denied { perfmon } for pid=3483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.646000 audit[3483]: AVC avc: denied { perfmon } for pid=3483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.646000 audit[3483]: AVC avc: denied { perfmon } for pid=3483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.646000 audit[3483]: AVC avc: denied { bpf } for pid=3483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.646000 audit[3483]: AVC avc: denied { bpf } for pid=3483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:36.646000 audit: BPF prog-id=136 op=LOAD Sep 13 00:47:36.646000 audit[3483]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003be168 items=0 ppid=3329 pid=3483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:36.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433303234343836653932633234363366366239626565383536343936 Sep 13 00:47:36.733068 env[1726]: time="2025-09-13T00:47:36.730357137Z" level=info msg="StartContainer for \"d3024486e92c2463f6b9bee85649673e98061f0706c1e94f81b7dde7aa99b3a7\" returns successfully" Sep 13 00:47:37.492126 kubelet[2611]: E0913 00:47:37.491425 2611 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gqprd" podUID="a9acc916-f8c5-498e-a936-eb42d96a2962" Sep 13 00:47:37.663169 kubelet[2611]: I0913 00:47:37.663082 2611 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-5966846d49-v6jmg" podStartSLOduration=2.01295785 podStartE2EDuration="4.662875896s" podCreationTimestamp="2025-09-13 00:47:33 +0000 UTC" firstStartedPulling="2025-09-13 00:47:33.887904629 +0000 UTC m=+21.577018629" lastFinishedPulling="2025-09-13 00:47:36.537822684 +0000 UTC m=+24.226936675" observedRunningTime="2025-09-13 00:47:37.661170532 +0000 UTC m=+25.350284535" watchObservedRunningTime="2025-09-13 00:47:37.662875896 +0000 UTC m=+25.351989896" Sep 13 00:47:37.669708 kubelet[2611]: E0913 00:47:37.669665 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:37.669708 kubelet[2611]: W0913 00:47:37.669699 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:37.669983 kubelet[2611]: E0913 00:47:37.669730 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:37.670043 kubelet[2611]: E0913 00:47:37.670023 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:37.670043 kubelet[2611]: W0913 00:47:37.670036 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:37.670161 kubelet[2611]: E0913 00:47:37.670052 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:37.670265 kubelet[2611]: E0913 00:47:37.670253 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:37.670325 kubelet[2611]: W0913 00:47:37.670266 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:37.670325 kubelet[2611]: E0913 00:47:37.670280 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:37.670981 kubelet[2611]: E0913 00:47:37.670961 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:37.672123 kubelet[2611]: W0913 00:47:37.672094 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:37.672213 kubelet[2611]: E0913 00:47:37.672124 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:37.674343 kubelet[2611]: E0913 00:47:37.674322 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:37.674343 kubelet[2611]: W0913 00:47:37.674340 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:37.674942 kubelet[2611]: E0913 00:47:37.674359 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:37.675174 kubelet[2611]: E0913 00:47:37.675154 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:37.675249 kubelet[2611]: W0913 00:47:37.675175 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:37.675249 kubelet[2611]: E0913 00:47:37.675193 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:37.676067 kubelet[2611]: E0913 00:47:37.676047 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:37.676067 kubelet[2611]: W0913 00:47:37.676064 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:37.676483 kubelet[2611]: E0913 00:47:37.676081 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:37.676812 kubelet[2611]: E0913 00:47:37.676792 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:37.676812 kubelet[2611]: W0913 00:47:37.676809 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:37.677162 kubelet[2611]: E0913 00:47:37.676824 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:37.677382 kubelet[2611]: E0913 00:47:37.677363 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:37.677382 kubelet[2611]: W0913 00:47:37.677380 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:37.677906 kubelet[2611]: E0913 00:47:37.677395 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:37.678129 kubelet[2611]: E0913 00:47:37.678111 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:37.678129 kubelet[2611]: W0913 00:47:37.678127 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:37.678593 kubelet[2611]: E0913 00:47:37.678143 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:37.678906 kubelet[2611]: E0913 00:47:37.678888 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:37.678906 kubelet[2611]: W0913 00:47:37.678904 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:37.679030 kubelet[2611]: E0913 00:47:37.678919 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:37.679205 kubelet[2611]: E0913 00:47:37.679188 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:37.679205 kubelet[2611]: W0913 00:47:37.679203 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:37.679327 kubelet[2611]: E0913 00:47:37.679218 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:37.679534 kubelet[2611]: E0913 00:47:37.679483 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:37.679534 kubelet[2611]: W0913 00:47:37.679495 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:37.679534 kubelet[2611]: E0913 00:47:37.679508 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:37.680750 kubelet[2611]: E0913 00:47:37.679968 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:37.680750 kubelet[2611]: W0913 00:47:37.679980 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:37.680750 kubelet[2611]: E0913 00:47:37.679990 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:37.680750 kubelet[2611]: E0913 00:47:37.680176 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:37.680750 kubelet[2611]: W0913 00:47:37.680189 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:37.680750 kubelet[2611]: E0913 00:47:37.680199 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:37.699671 kubelet[2611]: E0913 00:47:37.699642 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:37.699671 kubelet[2611]: W0913 00:47:37.699663 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:37.700093 kubelet[2611]: E0913 00:47:37.699683 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:37.700570 kubelet[2611]: E0913 00:47:37.700535 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:37.700570 kubelet[2611]: W0913 00:47:37.700564 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:37.700772 kubelet[2611]: E0913 00:47:37.700594 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:37.702146 kubelet[2611]: E0913 00:47:37.701595 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:37.702146 kubelet[2611]: W0913 00:47:37.701612 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:37.702146 kubelet[2611]: E0913 00:47:37.701633 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:37.702146 kubelet[2611]: E0913 00:47:37.701911 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:37.702146 kubelet[2611]: W0913 00:47:37.701923 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:37.702146 kubelet[2611]: E0913 00:47:37.702010 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:37.702507 kubelet[2611]: E0913 00:47:37.702159 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:37.702507 kubelet[2611]: W0913 00:47:37.702168 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:37.702507 kubelet[2611]: E0913 00:47:37.702255 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:37.703649 kubelet[2611]: E0913 00:47:37.703624 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:37.703649 kubelet[2611]: W0913 00:47:37.703643 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:37.704038 kubelet[2611]: E0913 00:47:37.703846 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:37.704612 kubelet[2611]: E0913 00:47:37.704591 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:37.704612 kubelet[2611]: W0913 00:47:37.704608 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:37.704786 kubelet[2611]: E0913 00:47:37.704728 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:37.705039 kubelet[2611]: E0913 00:47:37.705022 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:37.705039 kubelet[2611]: W0913 00:47:37.705037 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:37.705165 kubelet[2611]: E0913 00:47:37.705140 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:37.705341 kubelet[2611]: E0913 00:47:37.705325 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:37.705341 kubelet[2611]: W0913 00:47:37.705338 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:37.705491 kubelet[2611]: E0913 00:47:37.705470 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:37.705695 kubelet[2611]: E0913 00:47:37.705677 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:37.705695 kubelet[2611]: W0913 00:47:37.705692 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:37.705955 kubelet[2611]: E0913 00:47:37.705711 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:37.708683 kubelet[2611]: E0913 00:47:37.708659 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:37.708683 kubelet[2611]: W0913 00:47:37.708680 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:37.708877 kubelet[2611]: E0913 00:47:37.708800 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:37.708998 kubelet[2611]: E0913 00:47:37.708981 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:37.708998 kubelet[2611]: W0913 00:47:37.708995 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:37.709131 kubelet[2611]: E0913 00:47:37.709088 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:37.709256 kubelet[2611]: E0913 00:47:37.709237 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:37.709256 kubelet[2611]: W0913 00:47:37.709250 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:37.709390 kubelet[2611]: E0913 00:47:37.709267 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:37.709596 kubelet[2611]: E0913 00:47:37.709581 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:37.709692 kubelet[2611]: W0913 00:47:37.709678 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:37.709776 kubelet[2611]: E0913 00:47:37.709764 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:37.710345 kubelet[2611]: E0913 00:47:37.710320 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:37.710462 kubelet[2611]: W0913 00:47:37.710449 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:37.710655 kubelet[2611]: E0913 00:47:37.710640 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:37.712751 kubelet[2611]: E0913 00:47:37.712735 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:37.712863 kubelet[2611]: W0913 00:47:37.712850 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:37.712955 kubelet[2611]: E0913 00:47:37.712943 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:37.713304 kubelet[2611]: E0913 00:47:37.713289 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:37.713411 kubelet[2611]: W0913 00:47:37.713398 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:37.713486 kubelet[2611]: E0913 00:47:37.713475 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:37.714100 kubelet[2611]: E0913 00:47:37.714086 2611 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:47:37.714201 kubelet[2611]: W0913 00:47:37.714188 2611 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:47:37.714286 kubelet[2611]: E0913 00:47:37.714275 2611 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:47:38.228318 env[1726]: time="2025-09-13T00:47:38.228281229Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:38.232441 env[1726]: time="2025-09-13T00:47:38.232397564Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4f2b088ed6fdfc6a97ac0650a4ba8171107d6656ce265c592e4c8423fd10e5c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:38.235426 env[1726]: time="2025-09-13T00:47:38.235381787Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:38.238368 env[1726]: time="2025-09-13T00:47:38.238325232Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:81bdfcd9dbd36624dc35354e8c181c75631ba40e6c7df5820f5f56cea36f0ef9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:38.238853 env[1726]: time="2025-09-13T00:47:38.238801083Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\" returns image reference \"sha256:4f2b088ed6fdfc6a97ac0650a4ba8171107d6656ce265c592e4c8423fd10e5c4\"" Sep 13 00:47:38.243596 env[1726]: time="2025-09-13T00:47:38.243534887Z" level=info msg="CreateContainer within sandbox \"31bf4da5de20d520cbb0fbc64a26d0a7377993f7db865ee8117dd3d49cc17e0c\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Sep 13 00:47:38.271291 env[1726]: time="2025-09-13T00:47:38.271170496Z" level=info msg="CreateContainer within sandbox \"31bf4da5de20d520cbb0fbc64a26d0a7377993f7db865ee8117dd3d49cc17e0c\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"57b693a8d149560450e8f233ced0297b6568b24095e4d1a7aae3b9a66be41b3b\"" Sep 13 00:47:38.273281 env[1726]: time="2025-09-13T00:47:38.272662345Z" level=info msg="StartContainer for \"57b693a8d149560450e8f233ced0297b6568b24095e4d1a7aae3b9a66be41b3b\"" Sep 13 00:47:38.299492 systemd[1]: run-containerd-runc-k8s.io-57b693a8d149560450e8f233ced0297b6568b24095e4d1a7aae3b9a66be41b3b-runc.mFpQtI.mount: Deactivated successfully. Sep 13 00:47:38.303227 systemd[1]: Started cri-containerd-57b693a8d149560450e8f233ced0297b6568b24095e4d1a7aae3b9a66be41b3b.scope. Sep 13 00:47:38.325000 audit[3556]: AVC avc: denied { perfmon } for pid=3556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:38.325000 audit[3556]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f5ffc178a78 items=0 ppid=3393 pid=3556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:38.325000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537623639336138643134393536303435306538663233336365643032 Sep 13 00:47:38.325000 audit[3556]: AVC avc: denied { bpf } for pid=3556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:38.325000 audit[3556]: AVC avc: denied { bpf } for pid=3556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:38.325000 audit[3556]: AVC avc: denied { bpf } for pid=3556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:38.325000 audit[3556]: AVC avc: denied { perfmon } for pid=3556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:38.325000 audit[3556]: AVC avc: denied { perfmon } for pid=3556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:38.325000 audit[3556]: AVC avc: denied { perfmon } for pid=3556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:38.325000 audit[3556]: AVC avc: denied { perfmon } for pid=3556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:38.325000 audit[3556]: AVC avc: denied { perfmon } for pid=3556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:38.325000 audit[3556]: AVC avc: denied { bpf } for pid=3556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:38.325000 audit[3556]: AVC avc: denied { bpf } for pid=3556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:38.325000 audit: BPF prog-id=137 op=LOAD Sep 13 00:47:38.325000 audit[3556]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003a4208 items=0 ppid=3393 pid=3556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:38.325000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537623639336138643134393536303435306538663233336365643032 Sep 13 00:47:38.325000 audit[3556]: AVC avc: denied { bpf } for pid=3556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:38.325000 audit[3556]: AVC avc: denied { bpf } for pid=3556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:38.325000 audit[3556]: AVC avc: denied { perfmon } for pid=3556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:38.325000 audit[3556]: AVC avc: denied { perfmon } for pid=3556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:38.325000 audit[3556]: AVC avc: denied { perfmon } for pid=3556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:38.325000 audit[3556]: AVC avc: denied { perfmon } for pid=3556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:38.325000 audit[3556]: AVC avc: denied { perfmon } for pid=3556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:38.325000 audit[3556]: AVC avc: denied { bpf } for pid=3556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:38.325000 audit[3556]: AVC avc: denied { bpf } for pid=3556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:38.325000 audit: BPF prog-id=138 op=LOAD Sep 13 00:47:38.325000 audit[3556]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003a4258 items=0 ppid=3393 pid=3556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:38.325000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537623639336138643134393536303435306538663233336365643032 Sep 13 00:47:38.325000 audit: BPF prog-id=138 op=UNLOAD Sep 13 00:47:38.325000 audit: BPF prog-id=137 op=UNLOAD Sep 13 00:47:38.325000 audit[3556]: AVC avc: denied { bpf } for pid=3556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:38.325000 audit[3556]: AVC avc: denied { bpf } for pid=3556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:38.325000 audit[3556]: AVC avc: denied { bpf } for pid=3556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:38.325000 audit[3556]: AVC avc: denied { perfmon } for pid=3556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:38.325000 audit[3556]: AVC avc: denied { perfmon } for pid=3556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:38.325000 audit[3556]: AVC avc: denied { perfmon } for pid=3556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:38.325000 audit[3556]: AVC avc: denied { perfmon } for pid=3556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:38.325000 audit[3556]: AVC avc: denied { perfmon } for pid=3556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:38.325000 audit[3556]: AVC avc: denied { bpf } for pid=3556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:38.325000 audit[3556]: AVC avc: denied { bpf } for pid=3556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:38.325000 audit: BPF prog-id=139 op=LOAD Sep 13 00:47:38.325000 audit[3556]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003a42e8 items=0 ppid=3393 pid=3556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:38.325000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537623639336138643134393536303435306538663233336365643032 Sep 13 00:47:38.353209 env[1726]: time="2025-09-13T00:47:38.353110977Z" level=info msg="StartContainer for \"57b693a8d149560450e8f233ced0297b6568b24095e4d1a7aae3b9a66be41b3b\" returns successfully" Sep 13 00:47:38.368407 systemd[1]: cri-containerd-57b693a8d149560450e8f233ced0297b6568b24095e4d1a7aae3b9a66be41b3b.scope: Deactivated successfully. Sep 13 00:47:38.371000 audit: BPF prog-id=139 op=UNLOAD Sep 13 00:47:38.430189 env[1726]: time="2025-09-13T00:47:38.430131229Z" level=info msg="shim disconnected" id=57b693a8d149560450e8f233ced0297b6568b24095e4d1a7aae3b9a66be41b3b Sep 13 00:47:38.430189 env[1726]: time="2025-09-13T00:47:38.430189864Z" level=warning msg="cleaning up after shim disconnected" id=57b693a8d149560450e8f233ced0297b6568b24095e4d1a7aae3b9a66be41b3b namespace=k8s.io Sep 13 00:47:38.431658 env[1726]: time="2025-09-13T00:47:38.430202689Z" level=info msg="cleaning up dead shim" Sep 13 00:47:38.441964 env[1726]: time="2025-09-13T00:47:38.441908491Z" level=warning msg="cleanup warnings time=\"2025-09-13T00:47:38Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3596 runtime=io.containerd.runc.v2\n" Sep 13 00:47:38.547902 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-57b693a8d149560450e8f233ced0297b6568b24095e4d1a7aae3b9a66be41b3b-rootfs.mount: Deactivated successfully. Sep 13 00:47:38.621525 kubelet[2611]: I0913 00:47:38.621493 2611 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Sep 13 00:47:38.623098 env[1726]: time="2025-09-13T00:47:38.623061358Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\"" Sep 13 00:47:39.491924 kubelet[2611]: E0913 00:47:39.491870 2611 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gqprd" podUID="a9acc916-f8c5-498e-a936-eb42d96a2962" Sep 13 00:47:41.491940 kubelet[2611]: E0913 00:47:41.491396 2611 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gqprd" podUID="a9acc916-f8c5-498e-a936-eb42d96a2962" Sep 13 00:47:42.867220 env[1726]: time="2025-09-13T00:47:42.867140989Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:42.871410 env[1726]: time="2025-09-13T00:47:42.871358071Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:034822460c2f667e1f4a7679c843cc35ce1bf2c25dec86f04e07fb403df7e458,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:42.874285 env[1726]: time="2025-09-13T00:47:42.874245362Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:42.876952 env[1726]: time="2025-09-13T00:47:42.876908873Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:73d1e391050490d54e5bee8ff2b1a50a8be1746c98dc530361b00e8c0ab63f87,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:42.877453 env[1726]: time="2025-09-13T00:47:42.877415124Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\" returns image reference \"sha256:034822460c2f667e1f4a7679c843cc35ce1bf2c25dec86f04e07fb403df7e458\"" Sep 13 00:47:42.880198 env[1726]: time="2025-09-13T00:47:42.880159695Z" level=info msg="CreateContainer within sandbox \"31bf4da5de20d520cbb0fbc64a26d0a7377993f7db865ee8117dd3d49cc17e0c\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Sep 13 00:47:42.911983 env[1726]: time="2025-09-13T00:47:42.911634016Z" level=info msg="CreateContainer within sandbox \"31bf4da5de20d520cbb0fbc64a26d0a7377993f7db865ee8117dd3d49cc17e0c\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"d7e8f7f2628c652247702e846d24cbd1b833e878d6f234159c9956dd11dd2587\"" Sep 13 00:47:42.913238 env[1726]: time="2025-09-13T00:47:42.912757228Z" level=info msg="StartContainer for \"d7e8f7f2628c652247702e846d24cbd1b833e878d6f234159c9956dd11dd2587\"" Sep 13 00:47:42.959508 systemd[1]: run-containerd-runc-k8s.io-d7e8f7f2628c652247702e846d24cbd1b833e878d6f234159c9956dd11dd2587-runc.W14Ame.mount: Deactivated successfully. Sep 13 00:47:42.962660 systemd[1]: Started cri-containerd-d7e8f7f2628c652247702e846d24cbd1b833e878d6f234159c9956dd11dd2587.scope. Sep 13 00:47:42.982000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:42.985419 kernel: kauditd_printk_skb: 91 callbacks suppressed Sep 13 00:47:42.985588 kernel: audit: type=1400 audit(1757724462.982:948): avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:42.982000 audit[3624]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f1e2c686728 items=0 ppid=3393 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:43.001686 kernel: audit: type=1300 audit(1757724462.982:948): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f1e2c686728 items=0 ppid=3393 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:42.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437653866376632363238633635323234373730326538343664323463 Sep 13 00:47:43.024648 kernel: audit: type=1327 audit(1757724462.982:948): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437653866376632363238633635323234373730326538343664323463 Sep 13 00:47:43.034842 kernel: audit: type=1400 audit(1757724462.982:949): avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:43.034949 kernel: audit: type=1400 audit(1757724462.982:949): avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:42.982000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:42.982000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:43.035151 env[1726]: time="2025-09-13T00:47:43.028160330Z" level=info msg="StartContainer for \"d7e8f7f2628c652247702e846d24cbd1b833e878d6f234159c9956dd11dd2587\" returns successfully" Sep 13 00:47:42.982000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:43.045699 kernel: audit: type=1400 audit(1757724462.982:949): avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:42.982000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:42.982000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:43.064744 kernel: audit: type=1400 audit(1757724462.982:949): avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:43.064888 kernel: audit: type=1400 audit(1757724462.982:949): avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:42.982000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:43.072723 kernel: audit: type=1400 audit(1757724462.982:949): avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:42.982000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:43.080868 kernel: audit: type=1400 audit(1757724462.982:949): avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:42.982000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:42.982000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:42.982000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:42.982000 audit: BPF prog-id=140 op=LOAD Sep 13 00:47:42.982000 audit[3624]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c00029e208 items=0 ppid=3393 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:42.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437653866376632363238633635323234373730326538343664323463 Sep 13 00:47:42.982000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:42.982000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:42.982000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:42.982000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:42.982000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:42.982000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:42.982000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:42.982000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:42.982000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:42.982000 audit: BPF prog-id=141 op=LOAD Sep 13 00:47:42.982000 audit[3624]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c00029e258 items=0 ppid=3393 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:42.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437653866376632363238633635323234373730326538343664323463 Sep 13 00:47:42.982000 audit: BPF prog-id=141 op=UNLOAD Sep 13 00:47:42.982000 audit: BPF prog-id=140 op=UNLOAD Sep 13 00:47:42.982000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:42.982000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:42.982000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:42.982000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:42.982000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:42.982000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:42.982000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:42.982000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:42.982000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:42.982000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:42.982000 audit: BPF prog-id=142 op=LOAD Sep 13 00:47:42.982000 audit[3624]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c00029e2e8 items=0 ppid=3393 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:42.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437653866376632363238633635323234373730326538343664323463 Sep 13 00:47:43.492270 kubelet[2611]: E0913 00:47:43.492218 2611 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gqprd" podUID="a9acc916-f8c5-498e-a936-eb42d96a2962" Sep 13 00:47:44.014511 env[1726]: time="2025-09-13T00:47:44.014371074Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 13 00:47:44.018884 systemd[1]: cri-containerd-d7e8f7f2628c652247702e846d24cbd1b833e878d6f234159c9956dd11dd2587.scope: Deactivated successfully. Sep 13 00:47:44.022000 audit: BPF prog-id=142 op=UNLOAD Sep 13 00:47:44.044194 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d7e8f7f2628c652247702e846d24cbd1b833e878d6f234159c9956dd11dd2587-rootfs.mount: Deactivated successfully. Sep 13 00:47:44.061071 env[1726]: time="2025-09-13T00:47:44.061013880Z" level=info msg="shim disconnected" id=d7e8f7f2628c652247702e846d24cbd1b833e878d6f234159c9956dd11dd2587 Sep 13 00:47:44.061071 env[1726]: time="2025-09-13T00:47:44.061053035Z" level=warning msg="cleaning up after shim disconnected" id=d7e8f7f2628c652247702e846d24cbd1b833e878d6f234159c9956dd11dd2587 namespace=k8s.io Sep 13 00:47:44.061071 env[1726]: time="2025-09-13T00:47:44.061062528Z" level=info msg="cleaning up dead shim" Sep 13 00:47:44.063885 kubelet[2611]: I0913 00:47:44.062385 2611 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Sep 13 00:47:44.079606 env[1726]: time="2025-09-13T00:47:44.079536420Z" level=warning msg="cleanup warnings time=\"2025-09-13T00:47:44Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3665 runtime=io.containerd.runc.v2\n" Sep 13 00:47:44.394110 systemd[1]: Created slice kubepods-burstable-pod25e06c1f_1251_4571_ab79_6a6602efc42f.slice. Sep 13 00:47:44.402780 systemd[1]: Created slice kubepods-besteffort-pod3c832220_40d0_406a_bbd8_8df3c514c55e.slice. Sep 13 00:47:44.409736 systemd[1]: Created slice kubepods-burstable-pod9c1c985e_0356_4c2e_9ae2_014973546f81.slice. Sep 13 00:47:44.421456 systemd[1]: Created slice kubepods-besteffort-pod16d0b1a9_37f6_4d2e_b8a8_ba59e19f0516.slice. Sep 13 00:47:44.466568 kubelet[2611]: I0913 00:47:44.466499 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/25e06c1f-1251-4571-ab79-6a6602efc42f-config-volume\") pod \"coredns-668d6bf9bc-j248j\" (UID: \"25e06c1f-1251-4571-ab79-6a6602efc42f\") " pod="kube-system/coredns-668d6bf9bc-j248j" Sep 13 00:47:44.466568 kubelet[2611]: I0913 00:47:44.466534 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/9c1c985e-0356-4c2e-9ae2-014973546f81-config-volume\") pod \"coredns-668d6bf9bc-rwnwd\" (UID: \"9c1c985e-0356-4c2e-9ae2-014973546f81\") " pod="kube-system/coredns-668d6bf9bc-rwnwd" Sep 13 00:47:44.466568 kubelet[2611]: I0913 00:47:44.466571 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-w22mp\" (UniqueName: \"kubernetes.io/projected/3c832220-40d0-406a-bbd8-8df3c514c55e-kube-api-access-w22mp\") pod \"calico-apiserver-75d655b7b-65mmj\" (UID: \"3c832220-40d0-406a-bbd8-8df3c514c55e\") " pod="calico-apiserver/calico-apiserver-75d655b7b-65mmj" Sep 13 00:47:44.467309 kubelet[2611]: I0913 00:47:44.466594 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/16d0b1a9-37f6-4d2e-b8a8-ba59e19f0516-tigera-ca-bundle\") pod \"calico-kube-controllers-c859df7bc-8p7k4\" (UID: \"16d0b1a9-37f6-4d2e-b8a8-ba59e19f0516\") " pod="calico-system/calico-kube-controllers-c859df7bc-8p7k4" Sep 13 00:47:44.467309 kubelet[2611]: I0913 00:47:44.466648 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-m6r7w\" (UniqueName: \"kubernetes.io/projected/9c1c985e-0356-4c2e-9ae2-014973546f81-kube-api-access-m6r7w\") pod \"coredns-668d6bf9bc-rwnwd\" (UID: \"9c1c985e-0356-4c2e-9ae2-014973546f81\") " pod="kube-system/coredns-668d6bf9bc-rwnwd" Sep 13 00:47:44.467309 kubelet[2611]: I0913 00:47:44.466671 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rgqjb\" (UniqueName: \"kubernetes.io/projected/25e06c1f-1251-4571-ab79-6a6602efc42f-kube-api-access-rgqjb\") pod \"coredns-668d6bf9bc-j248j\" (UID: \"25e06c1f-1251-4571-ab79-6a6602efc42f\") " pod="kube-system/coredns-668d6bf9bc-j248j" Sep 13 00:47:44.467309 kubelet[2611]: I0913 00:47:44.466687 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/3c832220-40d0-406a-bbd8-8df3c514c55e-calico-apiserver-certs\") pod \"calico-apiserver-75d655b7b-65mmj\" (UID: \"3c832220-40d0-406a-bbd8-8df3c514c55e\") " pod="calico-apiserver/calico-apiserver-75d655b7b-65mmj" Sep 13 00:47:44.467309 kubelet[2611]: I0913 00:47:44.466723 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kw4hc\" (UniqueName: \"kubernetes.io/projected/16d0b1a9-37f6-4d2e-b8a8-ba59e19f0516-kube-api-access-kw4hc\") pod \"calico-kube-controllers-c859df7bc-8p7k4\" (UID: \"16d0b1a9-37f6-4d2e-b8a8-ba59e19f0516\") " pod="calico-system/calico-kube-controllers-c859df7bc-8p7k4" Sep 13 00:47:44.471256 systemd[1]: Created slice kubepods-besteffort-pod73617415_dc3c_42a6_aa92_204e06c5568d.slice. Sep 13 00:47:44.479026 systemd[1]: Created slice kubepods-besteffort-pod908b4e5f_addd_4d5c_a146_1b9da1f1b4f4.slice. Sep 13 00:47:44.482912 systemd[1]: Created slice kubepods-besteffort-pode8d89abb_6036_40eb_8686_f59fb32e8978.slice. Sep 13 00:47:44.567472 kubelet[2611]: I0913 00:47:44.567395 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qqxcv\" (UniqueName: \"kubernetes.io/projected/908b4e5f-addd-4d5c-a146-1b9da1f1b4f4-kube-api-access-qqxcv\") pod \"goldmane-54d579b49d-krd8k\" (UID: \"908b4e5f-addd-4d5c-a146-1b9da1f1b4f4\") " pod="calico-system/goldmane-54d579b49d-krd8k" Sep 13 00:47:44.567472 kubelet[2611]: I0913 00:47:44.567444 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/73617415-dc3c-42a6-aa92-204e06c5568d-whisker-ca-bundle\") pod \"whisker-744ff764b6-md9lk\" (UID: \"73617415-dc3c-42a6-aa92-204e06c5568d\") " pod="calico-system/whisker-744ff764b6-md9lk" Sep 13 00:47:44.567472 kubelet[2611]: I0913 00:47:44.567467 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dmqw8\" (UniqueName: \"kubernetes.io/projected/e8d89abb-6036-40eb-8686-f59fb32e8978-kube-api-access-dmqw8\") pod \"calico-apiserver-75d655b7b-m8hcv\" (UID: \"e8d89abb-6036-40eb-8686-f59fb32e8978\") " pod="calico-apiserver/calico-apiserver-75d655b7b-m8hcv" Sep 13 00:47:44.567472 kubelet[2611]: I0913 00:47:44.567486 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-key-pair\" (UniqueName: \"kubernetes.io/secret/908b4e5f-addd-4d5c-a146-1b9da1f1b4f4-goldmane-key-pair\") pod \"goldmane-54d579b49d-krd8k\" (UID: \"908b4e5f-addd-4d5c-a146-1b9da1f1b4f4\") " pod="calico-system/goldmane-54d579b49d-krd8k" Sep 13 00:47:44.568157 kubelet[2611]: I0913 00:47:44.567504 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config\" (UniqueName: \"kubernetes.io/configmap/908b4e5f-addd-4d5c-a146-1b9da1f1b4f4-config\") pod \"goldmane-54d579b49d-krd8k\" (UID: \"908b4e5f-addd-4d5c-a146-1b9da1f1b4f4\") " pod="calico-system/goldmane-54d579b49d-krd8k" Sep 13 00:47:44.568157 kubelet[2611]: I0913 00:47:44.567525 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/e8d89abb-6036-40eb-8686-f59fb32e8978-calico-apiserver-certs\") pod \"calico-apiserver-75d655b7b-m8hcv\" (UID: \"e8d89abb-6036-40eb-8686-f59fb32e8978\") " pod="calico-apiserver/calico-apiserver-75d655b7b-m8hcv" Sep 13 00:47:44.568157 kubelet[2611]: I0913 00:47:44.567616 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/73617415-dc3c-42a6-aa92-204e06c5568d-whisker-backend-key-pair\") pod \"whisker-744ff764b6-md9lk\" (UID: \"73617415-dc3c-42a6-aa92-204e06c5568d\") " pod="calico-system/whisker-744ff764b6-md9lk" Sep 13 00:47:44.568157 kubelet[2611]: I0913 00:47:44.567633 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-x9r8n\" (UniqueName: \"kubernetes.io/projected/73617415-dc3c-42a6-aa92-204e06c5568d-kube-api-access-x9r8n\") pod \"whisker-744ff764b6-md9lk\" (UID: \"73617415-dc3c-42a6-aa92-204e06c5568d\") " pod="calico-system/whisker-744ff764b6-md9lk" Sep 13 00:47:44.568157 kubelet[2611]: I0913 00:47:44.567822 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/908b4e5f-addd-4d5c-a146-1b9da1f1b4f4-goldmane-ca-bundle\") pod \"goldmane-54d579b49d-krd8k\" (UID: \"908b4e5f-addd-4d5c-a146-1b9da1f1b4f4\") " pod="calico-system/goldmane-54d579b49d-krd8k" Sep 13 00:47:44.662998 env[1726]: time="2025-09-13T00:47:44.661825050Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\"" Sep 13 00:47:44.701259 env[1726]: time="2025-09-13T00:47:44.701189012Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-j248j,Uid:25e06c1f-1251-4571-ab79-6a6602efc42f,Namespace:kube-system,Attempt:0,}" Sep 13 00:47:44.718537 env[1726]: time="2025-09-13T00:47:44.718457734Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75d655b7b-65mmj,Uid:3c832220-40d0-406a-bbd8-8df3c514c55e,Namespace:calico-apiserver,Attempt:0,}" Sep 13 00:47:44.719000 env[1726]: time="2025-09-13T00:47:44.718967328Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-rwnwd,Uid:9c1c985e-0356-4c2e-9ae2-014973546f81,Namespace:kube-system,Attempt:0,}" Sep 13 00:47:44.725657 env[1726]: time="2025-09-13T00:47:44.725614587Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-c859df7bc-8p7k4,Uid:16d0b1a9-37f6-4d2e-b8a8-ba59e19f0516,Namespace:calico-system,Attempt:0,}" Sep 13 00:47:44.773858 env[1726]: time="2025-09-13T00:47:44.773814629Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-744ff764b6-md9lk,Uid:73617415-dc3c-42a6-aa92-204e06c5568d,Namespace:calico-system,Attempt:0,}" Sep 13 00:47:44.781899 env[1726]: time="2025-09-13T00:47:44.781857111Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-54d579b49d-krd8k,Uid:908b4e5f-addd-4d5c-a146-1b9da1f1b4f4,Namespace:calico-system,Attempt:0,}" Sep 13 00:47:44.787076 env[1726]: time="2025-09-13T00:47:44.787002910Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75d655b7b-m8hcv,Uid:e8d89abb-6036-40eb-8686-f59fb32e8978,Namespace:calico-apiserver,Attempt:0,}" Sep 13 00:47:45.168084 env[1726]: time="2025-09-13T00:47:45.167991646Z" level=error msg="Failed to destroy network for sandbox \"bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:47:45.171926 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051-shm.mount: Deactivated successfully. Sep 13 00:47:45.172891 env[1726]: time="2025-09-13T00:47:45.172831981Z" level=error msg="encountered an error cleaning up failed sandbox \"bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:47:45.173101 env[1726]: time="2025-09-13T00:47:45.173062398Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-rwnwd,Uid:9c1c985e-0356-4c2e-9ae2-014973546f81,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:47:45.181886 kubelet[2611]: E0913 00:47:45.178792 2611 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:47:45.184576 kubelet[2611]: E0913 00:47:45.184504 2611 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-rwnwd" Sep 13 00:47:45.184772 kubelet[2611]: E0913 00:47:45.184597 2611 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-rwnwd" Sep 13 00:47:45.184772 kubelet[2611]: E0913 00:47:45.184666 2611 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-rwnwd_kube-system(9c1c985e-0356-4c2e-9ae2-014973546f81)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-rwnwd_kube-system(9c1c985e-0356-4c2e-9ae2-014973546f81)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-rwnwd" podUID="9c1c985e-0356-4c2e-9ae2-014973546f81" Sep 13 00:47:45.192581 env[1726]: time="2025-09-13T00:47:45.192507068Z" level=error msg="Failed to destroy network for sandbox \"2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:47:45.198978 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e-shm.mount: Deactivated successfully. Sep 13 00:47:45.201317 env[1726]: time="2025-09-13T00:47:45.201254640Z" level=error msg="encountered an error cleaning up failed sandbox \"2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:47:45.201447 env[1726]: time="2025-09-13T00:47:45.201352859Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-744ff764b6-md9lk,Uid:73617415-dc3c-42a6-aa92-204e06c5568d,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:47:45.201674 kubelet[2611]: E0913 00:47:45.201634 2611 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:47:45.201766 kubelet[2611]: E0913 00:47:45.201710 2611 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-744ff764b6-md9lk" Sep 13 00:47:45.201766 kubelet[2611]: E0913 00:47:45.201740 2611 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-744ff764b6-md9lk" Sep 13 00:47:45.203995 kubelet[2611]: E0913 00:47:45.201793 2611 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"whisker-744ff764b6-md9lk_calico-system(73617415-dc3c-42a6-aa92-204e06c5568d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"whisker-744ff764b6-md9lk_calico-system(73617415-dc3c-42a6-aa92-204e06c5568d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-744ff764b6-md9lk" podUID="73617415-dc3c-42a6-aa92-204e06c5568d" Sep 13 00:47:45.204577 env[1726]: time="2025-09-13T00:47:45.204497022Z" level=error msg="Failed to destroy network for sandbox \"7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:47:45.210997 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d-shm.mount: Deactivated successfully. Sep 13 00:47:45.213340 env[1726]: time="2025-09-13T00:47:45.213279787Z" level=error msg="Failed to destroy network for sandbox \"5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:47:45.214759 env[1726]: time="2025-09-13T00:47:45.214705445Z" level=error msg="Failed to destroy network for sandbox \"c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:47:45.215299 env[1726]: time="2025-09-13T00:47:45.215256980Z" level=error msg="encountered an error cleaning up failed sandbox \"c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:47:45.215636 env[1726]: time="2025-09-13T00:47:45.215590418Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75d655b7b-65mmj,Uid:3c832220-40d0-406a-bbd8-8df3c514c55e,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:47:45.216114 env[1726]: time="2025-09-13T00:47:45.216077245Z" level=error msg="encountered an error cleaning up failed sandbox \"7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:47:45.216295 env[1726]: time="2025-09-13T00:47:45.216249039Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-j248j,Uid:25e06c1f-1251-4571-ab79-6a6602efc42f,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:47:45.216654 env[1726]: time="2025-09-13T00:47:45.216619028Z" level=error msg="encountered an error cleaning up failed sandbox \"5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:47:45.216820 env[1726]: time="2025-09-13T00:47:45.216772587Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-c859df7bc-8p7k4,Uid:16d0b1a9-37f6-4d2e-b8a8-ba59e19f0516,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:47:45.218095 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d-shm.mount: Deactivated successfully. Sep 13 00:47:45.218234 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d-shm.mount: Deactivated successfully. Sep 13 00:47:45.222169 kubelet[2611]: E0913 00:47:45.221818 2611 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:47:45.222169 kubelet[2611]: E0913 00:47:45.221892 2611 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-c859df7bc-8p7k4" Sep 13 00:47:45.222169 kubelet[2611]: E0913 00:47:45.221918 2611 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-c859df7bc-8p7k4" Sep 13 00:47:45.227185 kubelet[2611]: E0913 00:47:45.221970 2611 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-c859df7bc-8p7k4_calico-system(16d0b1a9-37f6-4d2e-b8a8-ba59e19f0516)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-c859df7bc-8p7k4_calico-system(16d0b1a9-37f6-4d2e-b8a8-ba59e19f0516)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-c859df7bc-8p7k4" podUID="16d0b1a9-37f6-4d2e-b8a8-ba59e19f0516" Sep 13 00:47:45.227185 kubelet[2611]: E0913 00:47:45.223307 2611 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:47:45.227185 kubelet[2611]: E0913 00:47:45.223367 2611 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-75d655b7b-65mmj" Sep 13 00:47:45.227432 kubelet[2611]: E0913 00:47:45.223407 2611 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-75d655b7b-65mmj" Sep 13 00:47:45.227432 kubelet[2611]: E0913 00:47:45.223468 2611 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-75d655b7b-65mmj_calico-apiserver(3c832220-40d0-406a-bbd8-8df3c514c55e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-75d655b7b-65mmj_calico-apiserver(3c832220-40d0-406a-bbd8-8df3c514c55e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-75d655b7b-65mmj" podUID="3c832220-40d0-406a-bbd8-8df3c514c55e" Sep 13 00:47:45.227432 kubelet[2611]: E0913 00:47:45.223521 2611 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:47:45.227621 kubelet[2611]: E0913 00:47:45.223631 2611 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-j248j" Sep 13 00:47:45.227621 kubelet[2611]: E0913 00:47:45.223658 2611 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-j248j" Sep 13 00:47:45.227621 kubelet[2611]: E0913 00:47:45.223798 2611 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-j248j_kube-system(25e06c1f-1251-4571-ab79-6a6602efc42f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-j248j_kube-system(25e06c1f-1251-4571-ab79-6a6602efc42f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-j248j" podUID="25e06c1f-1251-4571-ab79-6a6602efc42f" Sep 13 00:47:45.242401 env[1726]: time="2025-09-13T00:47:45.242339046Z" level=error msg="Failed to destroy network for sandbox \"9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:47:45.243337 env[1726]: time="2025-09-13T00:47:45.243285235Z" level=error msg="encountered an error cleaning up failed sandbox \"9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:47:45.243511 env[1726]: time="2025-09-13T00:47:45.243481074Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75d655b7b-m8hcv,Uid:e8d89abb-6036-40eb-8686-f59fb32e8978,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:47:45.244395 kubelet[2611]: E0913 00:47:45.244338 2611 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:47:45.244508 kubelet[2611]: E0913 00:47:45.244410 2611 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-75d655b7b-m8hcv" Sep 13 00:47:45.244508 kubelet[2611]: E0913 00:47:45.244449 2611 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-75d655b7b-m8hcv" Sep 13 00:47:45.244641 kubelet[2611]: E0913 00:47:45.244502 2611 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-75d655b7b-m8hcv_calico-apiserver(e8d89abb-6036-40eb-8686-f59fb32e8978)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-75d655b7b-m8hcv_calico-apiserver(e8d89abb-6036-40eb-8686-f59fb32e8978)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-75d655b7b-m8hcv" podUID="e8d89abb-6036-40eb-8686-f59fb32e8978" Sep 13 00:47:45.245172 env[1726]: time="2025-09-13T00:47:45.245109121Z" level=error msg="Failed to destroy network for sandbox \"ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:47:45.245784 env[1726]: time="2025-09-13T00:47:45.245745670Z" level=error msg="encountered an error cleaning up failed sandbox \"ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:47:45.246012 env[1726]: time="2025-09-13T00:47:45.245976306Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-54d579b49d-krd8k,Uid:908b4e5f-addd-4d5c-a146-1b9da1f1b4f4,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:47:45.246449 kubelet[2611]: E0913 00:47:45.246413 2611 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:47:45.246616 kubelet[2611]: E0913 00:47:45.246472 2611 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-54d579b49d-krd8k" Sep 13 00:47:45.246616 kubelet[2611]: E0913 00:47:45.246500 2611 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-54d579b49d-krd8k" Sep 13 00:47:45.246854 kubelet[2611]: E0913 00:47:45.246808 2611 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"goldmane-54d579b49d-krd8k_calico-system(908b4e5f-addd-4d5c-a146-1b9da1f1b4f4)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"goldmane-54d579b49d-krd8k_calico-system(908b4e5f-addd-4d5c-a146-1b9da1f1b4f4)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-54d579b49d-krd8k" podUID="908b4e5f-addd-4d5c-a146-1b9da1f1b4f4" Sep 13 00:47:45.497678 systemd[1]: Created slice kubepods-besteffort-poda9acc916_f8c5_498e_a936_eb42d96a2962.slice. Sep 13 00:47:45.503177 env[1726]: time="2025-09-13T00:47:45.503127527Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-gqprd,Uid:a9acc916-f8c5-498e-a936-eb42d96a2962,Namespace:calico-system,Attempt:0,}" Sep 13 00:47:45.590804 env[1726]: time="2025-09-13T00:47:45.590743579Z" level=error msg="Failed to destroy network for sandbox \"a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:47:45.591142 env[1726]: time="2025-09-13T00:47:45.591102874Z" level=error msg="encountered an error cleaning up failed sandbox \"a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:47:45.591234 env[1726]: time="2025-09-13T00:47:45.591199541Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-gqprd,Uid:a9acc916-f8c5-498e-a936-eb42d96a2962,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:47:45.591507 kubelet[2611]: E0913 00:47:45.591464 2611 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:47:45.592053 kubelet[2611]: E0913 00:47:45.591607 2611 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-gqprd" Sep 13 00:47:45.592053 kubelet[2611]: E0913 00:47:45.591658 2611 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-gqprd" Sep 13 00:47:45.592053 kubelet[2611]: E0913 00:47:45.591805 2611 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-gqprd_calico-system(a9acc916-f8c5-498e-a936-eb42d96a2962)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-gqprd_calico-system(a9acc916-f8c5-498e-a936-eb42d96a2962)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-gqprd" podUID="a9acc916-f8c5-498e-a936-eb42d96a2962" Sep 13 00:47:45.672023 kubelet[2611]: I0913 00:47:45.671962 2611 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41" Sep 13 00:47:45.707060 env[1726]: time="2025-09-13T00:47:45.706914317Z" level=info msg="StopPodSandbox for \"9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41\"" Sep 13 00:47:45.720386 kubelet[2611]: I0913 00:47:45.707352 2611 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d" Sep 13 00:47:45.723159 kubelet[2611]: I0913 00:47:45.723138 2611 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e" Sep 13 00:47:45.725411 env[1726]: time="2025-09-13T00:47:45.725358336Z" level=info msg="StopPodSandbox for \"2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e\"" Sep 13 00:47:45.727509 kubelet[2611]: I0913 00:47:45.727482 2611 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d" Sep 13 00:47:45.728391 env[1726]: time="2025-09-13T00:47:45.728350337Z" level=info msg="StopPodSandbox for \"5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d\"" Sep 13 00:47:45.729473 kubelet[2611]: I0913 00:47:45.729453 2611 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d" Sep 13 00:47:45.732252 env[1726]: time="2025-09-13T00:47:45.732218601Z" level=info msg="StopPodSandbox for \"7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d\"" Sep 13 00:47:45.734187 env[1726]: time="2025-09-13T00:47:45.734152543Z" level=info msg="StopPodSandbox for \"c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d\"" Sep 13 00:47:45.734422 kubelet[2611]: I0913 00:47:45.734400 2611 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a" Sep 13 00:47:45.736137 env[1726]: time="2025-09-13T00:47:45.735612686Z" level=info msg="StopPodSandbox for \"a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a\"" Sep 13 00:47:45.743587 kubelet[2611]: I0913 00:47:45.743531 2611 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a" Sep 13 00:47:45.744354 env[1726]: time="2025-09-13T00:47:45.744315284Z" level=info msg="StopPodSandbox for \"ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a\"" Sep 13 00:47:45.746345 kubelet[2611]: I0913 00:47:45.746300 2611 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051" Sep 13 00:47:45.747185 env[1726]: time="2025-09-13T00:47:45.747146865Z" level=info msg="StopPodSandbox for \"bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051\"" Sep 13 00:47:45.886188 env[1726]: time="2025-09-13T00:47:45.886121251Z" level=error msg="StopPodSandbox for \"9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41\" failed" error="failed to destroy network for sandbox \"9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:47:45.886905 kubelet[2611]: E0913 00:47:45.886577 2611 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41" Sep 13 00:47:45.886905 kubelet[2611]: E0913 00:47:45.886671 2611 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41"} Sep 13 00:47:45.886905 kubelet[2611]: E0913 00:47:45.886796 2611 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e8d89abb-6036-40eb-8686-f59fb32e8978\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:47:45.886905 kubelet[2611]: E0913 00:47:45.886833 2611 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e8d89abb-6036-40eb-8686-f59fb32e8978\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-75d655b7b-m8hcv" podUID="e8d89abb-6036-40eb-8686-f59fb32e8978" Sep 13 00:47:45.972563 env[1726]: time="2025-09-13T00:47:45.972486694Z" level=error msg="StopPodSandbox for \"2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e\" failed" error="failed to destroy network for sandbox \"2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:47:45.973211 kubelet[2611]: E0913 00:47:45.972989 2611 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e" Sep 13 00:47:45.973211 kubelet[2611]: E0913 00:47:45.973064 2611 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e"} Sep 13 00:47:45.973211 kubelet[2611]: E0913 00:47:45.973125 2611 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"73617415-dc3c-42a6-aa92-204e06c5568d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:47:45.973211 kubelet[2611]: E0913 00:47:45.973174 2611 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"73617415-dc3c-42a6-aa92-204e06c5568d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-744ff764b6-md9lk" podUID="73617415-dc3c-42a6-aa92-204e06c5568d" Sep 13 00:47:45.980756 env[1726]: time="2025-09-13T00:47:45.980689876Z" level=error msg="StopPodSandbox for \"7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d\" failed" error="failed to destroy network for sandbox \"7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:47:45.981368 kubelet[2611]: E0913 00:47:45.981140 2611 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d" Sep 13 00:47:45.981368 kubelet[2611]: E0913 00:47:45.981221 2611 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d"} Sep 13 00:47:45.981368 kubelet[2611]: E0913 00:47:45.981285 2611 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"25e06c1f-1251-4571-ab79-6a6602efc42f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:47:45.981368 kubelet[2611]: E0913 00:47:45.981332 2611 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"25e06c1f-1251-4571-ab79-6a6602efc42f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-j248j" podUID="25e06c1f-1251-4571-ab79-6a6602efc42f" Sep 13 00:47:45.995962 env[1726]: time="2025-09-13T00:47:45.995886123Z" level=error msg="StopPodSandbox for \"5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d\" failed" error="failed to destroy network for sandbox \"5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:47:45.996382 kubelet[2611]: E0913 00:47:45.996317 2611 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d" Sep 13 00:47:45.996533 kubelet[2611]: E0913 00:47:45.996395 2611 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d"} Sep 13 00:47:45.996533 kubelet[2611]: E0913 00:47:45.996439 2611 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"16d0b1a9-37f6-4d2e-b8a8-ba59e19f0516\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:47:45.996533 kubelet[2611]: E0913 00:47:45.996471 2611 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"16d0b1a9-37f6-4d2e-b8a8-ba59e19f0516\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-c859df7bc-8p7k4" podUID="16d0b1a9-37f6-4d2e-b8a8-ba59e19f0516" Sep 13 00:47:45.999893 env[1726]: time="2025-09-13T00:47:45.999830775Z" level=error msg="StopPodSandbox for \"ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a\" failed" error="failed to destroy network for sandbox \"ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:47:46.000079 env[1726]: time="2025-09-13T00:47:46.000008893Z" level=error msg="StopPodSandbox for \"a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a\" failed" error="failed to destroy network for sandbox \"a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:47:46.000407 kubelet[2611]: E0913 00:47:46.000364 2611 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a" Sep 13 00:47:46.000752 kubelet[2611]: E0913 00:47:46.000423 2611 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a"} Sep 13 00:47:46.000752 kubelet[2611]: E0913 00:47:46.000372 2611 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a" Sep 13 00:47:46.000752 kubelet[2611]: E0913 00:47:46.000467 2611 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a"} Sep 13 00:47:46.000752 kubelet[2611]: E0913 00:47:46.000476 2611 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"908b4e5f-addd-4d5c-a146-1b9da1f1b4f4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:47:46.000752 kubelet[2611]: E0913 00:47:46.000496 2611 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a9acc916-f8c5-498e-a936-eb42d96a2962\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:47:46.001169 kubelet[2611]: E0913 00:47:46.000506 2611 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"908b4e5f-addd-4d5c-a146-1b9da1f1b4f4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-54d579b49d-krd8k" podUID="908b4e5f-addd-4d5c-a146-1b9da1f1b4f4" Sep 13 00:47:46.001169 kubelet[2611]: E0913 00:47:46.000620 2611 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a9acc916-f8c5-498e-a936-eb42d96a2962\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-gqprd" podUID="a9acc916-f8c5-498e-a936-eb42d96a2962" Sep 13 00:47:46.024845 env[1726]: time="2025-09-13T00:47:46.024784745Z" level=error msg="StopPodSandbox for \"c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d\" failed" error="failed to destroy network for sandbox \"c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:47:46.025284 kubelet[2611]: E0913 00:47:46.025239 2611 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d" Sep 13 00:47:46.025401 kubelet[2611]: E0913 00:47:46.025303 2611 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d"} Sep 13 00:47:46.025401 kubelet[2611]: E0913 00:47:46.025348 2611 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3c832220-40d0-406a-bbd8-8df3c514c55e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:47:46.025401 kubelet[2611]: E0913 00:47:46.025377 2611 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3c832220-40d0-406a-bbd8-8df3c514c55e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-75d655b7b-65mmj" podUID="3c832220-40d0-406a-bbd8-8df3c514c55e" Sep 13 00:47:46.031744 env[1726]: time="2025-09-13T00:47:46.031664900Z" level=error msg="StopPodSandbox for \"bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051\" failed" error="failed to destroy network for sandbox \"bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:47:46.032132 kubelet[2611]: E0913 00:47:46.032086 2611 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051" Sep 13 00:47:46.032267 kubelet[2611]: E0913 00:47:46.032153 2611 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051"} Sep 13 00:47:46.032267 kubelet[2611]: E0913 00:47:46.032197 2611 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9c1c985e-0356-4c2e-9ae2-014973546f81\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:47:46.032267 kubelet[2611]: E0913 00:47:46.032233 2611 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9c1c985e-0356-4c2e-9ae2-014973546f81\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-rwnwd" podUID="9c1c985e-0356-4c2e-9ae2-014973546f81" Sep 13 00:47:46.045948 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41-shm.mount: Deactivated successfully. Sep 13 00:47:46.046075 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a-shm.mount: Deactivated successfully. Sep 13 00:47:49.988763 kubelet[2611]: I0913 00:47:49.988721 2611 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Sep 13 00:47:50.330000 audit[4034]: NETFILTER_CFG table=filter:99 family=2 entries=21 op=nft_register_rule pid=4034 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:47:50.333735 kernel: kauditd_printk_skb: 34 callbacks suppressed Sep 13 00:47:50.334596 kernel: audit: type=1325 audit(1757724470.330:955): table=filter:99 family=2 entries=21 op=nft_register_rule pid=4034 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:47:50.330000 audit[4034]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffd845a93b0 a2=0 a3=7ffd845a939c items=0 ppid=2978 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:50.347398 kernel: audit: type=1300 audit(1757724470.330:955): arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffd845a93b0 a2=0 a3=7ffd845a939c items=0 ppid=2978 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:50.330000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:47:50.362092 kernel: audit: type=1327 audit(1757724470.330:955): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:47:50.362221 kernel: audit: type=1325 audit(1757724470.348:956): table=nat:100 family=2 entries=19 op=nft_register_chain pid=4034 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:47:50.348000 audit[4034]: NETFILTER_CFG table=nat:100 family=2 entries=19 op=nft_register_chain pid=4034 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:47:50.377608 kernel: audit: type=1300 audit(1757724470.348:956): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffd845a93b0 a2=0 a3=7ffd845a939c items=0 ppid=2978 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:50.383171 kernel: audit: type=1327 audit(1757724470.348:956): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:47:50.348000 audit[4034]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffd845a93b0 a2=0 a3=7ffd845a939c items=0 ppid=2978 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:50.348000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:47:52.510463 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1185787626.mount: Deactivated successfully. Sep 13 00:47:52.550686 env[1726]: time="2025-09-13T00:47:52.550641480Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:52.559319 env[1726]: time="2025-09-13T00:47:52.559270220Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ce9c4ac0f175f22c56e80844e65379d9ebe1d8a4e2bbb38dc1db0f53a8826f0f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:52.588517 env[1726]: time="2025-09-13T00:47:52.588476005Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:52.591579 env[1726]: time="2025-09-13T00:47:52.591531065Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:bcb8146fcaeced1e1c88fad3eaa697f1680746bd23c3e7e8d4535bc484c6f2a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:52.592117 env[1726]: time="2025-09-13T00:47:52.592092153Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\" returns image reference \"sha256:ce9c4ac0f175f22c56e80844e65379d9ebe1d8a4e2bbb38dc1db0f53a8826f0f\"" Sep 13 00:47:52.623018 env[1726]: time="2025-09-13T00:47:52.622969877Z" level=info msg="CreateContainer within sandbox \"31bf4da5de20d520cbb0fbc64a26d0a7377993f7db865ee8117dd3d49cc17e0c\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Sep 13 00:47:52.650721 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1659402172.mount: Deactivated successfully. Sep 13 00:47:52.660498 env[1726]: time="2025-09-13T00:47:52.660429540Z" level=info msg="CreateContainer within sandbox \"31bf4da5de20d520cbb0fbc64a26d0a7377993f7db865ee8117dd3d49cc17e0c\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"6cb8aba7eee7989057b44821b41666c8cd75bc55cca167837f802d52af7b74ec\"" Sep 13 00:47:52.662079 env[1726]: time="2025-09-13T00:47:52.661186743Z" level=info msg="StartContainer for \"6cb8aba7eee7989057b44821b41666c8cd75bc55cca167837f802d52af7b74ec\"" Sep 13 00:47:52.683053 systemd[1]: Started cri-containerd-6cb8aba7eee7989057b44821b41666c8cd75bc55cca167837f802d52af7b74ec.scope. Sep 13 00:47:52.709000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:52.727427 kernel: audit: type=1400 audit(1757724472.709:957): avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:52.727670 kernel: audit: type=1300 audit(1757724472.709:957): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f4f3c6af5f8 items=0 ppid=3393 pid=4045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:52.709000 audit[4045]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f4f3c6af5f8 items=0 ppid=3393 pid=4045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:52.709000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663623861626137656565373938393035376234343832316234313636 Sep 13 00:47:52.748740 kernel: audit: type=1327 audit(1757724472.709:957): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663623861626137656565373938393035376234343832316234313636 Sep 13 00:47:52.748832 kernel: audit: type=1400 audit(1757724472.709:958): avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:52.709000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:52.709000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:52.709000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:52.709000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:52.709000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:52.709000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:52.709000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:52.709000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:52.709000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:52.709000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:52.709000 audit: BPF prog-id=143 op=LOAD Sep 13 00:47:52.709000 audit[4045]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00029ae58 items=0 ppid=3393 pid=4045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:52.709000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663623861626137656565373938393035376234343832316234313636 Sep 13 00:47:52.709000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:52.709000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:52.709000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:52.709000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:52.709000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:52.709000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:52.709000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:52.709000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:52.709000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:52.709000 audit: BPF prog-id=144 op=LOAD Sep 13 00:47:52.709000 audit[4045]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00029aea8 items=0 ppid=3393 pid=4045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:52.709000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663623861626137656565373938393035376234343832316234313636 Sep 13 00:47:52.709000 audit: BPF prog-id=144 op=UNLOAD Sep 13 00:47:52.709000 audit: BPF prog-id=143 op=UNLOAD Sep 13 00:47:52.709000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:52.709000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:52.709000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:52.709000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:52.709000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:52.709000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:52.709000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:52.709000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:52.709000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:52.709000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:52.709000 audit: BPF prog-id=145 op=LOAD Sep 13 00:47:52.709000 audit[4045]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c00029af38 items=0 ppid=3393 pid=4045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:52.709000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663623861626137656565373938393035376234343832316234313636 Sep 13 00:47:52.752642 env[1726]: time="2025-09-13T00:47:52.749925087Z" level=info msg="StartContainer for \"6cb8aba7eee7989057b44821b41666c8cd75bc55cca167837f802d52af7b74ec\" returns successfully" Sep 13 00:47:52.837734 kubelet[2611]: I0913 00:47:52.834426 2611 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-s8nmf" podStartSLOduration=1.359200635 podStartE2EDuration="19.834398723s" podCreationTimestamp="2025-09-13 00:47:33 +0000 UTC" firstStartedPulling="2025-09-13 00:47:34.117670464 +0000 UTC m=+21.806784446" lastFinishedPulling="2025-09-13 00:47:52.592868555 +0000 UTC m=+40.281982534" observedRunningTime="2025-09-13 00:47:52.83408332 +0000 UTC m=+40.523197320" watchObservedRunningTime="2025-09-13 00:47:52.834398723 +0000 UTC m=+40.523512722" Sep 13 00:47:53.459932 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Sep 13 00:47:53.460233 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Sep 13 00:47:53.802524 kubelet[2611]: I0913 00:47:53.802428 2611 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Sep 13 00:47:54.513765 env[1726]: time="2025-09-13T00:47:54.513714544Z" level=info msg="StopPodSandbox for \"2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e\"" Sep 13 00:47:54.929000 audit[4169]: AVC avc: denied { write } for pid=4169 comm="tee" name="fd" dev="proc" ino=25906 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:47:54.929000 audit[4169]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffed44047e3 a2=241 a3=1b6 items=1 ppid=4137 pid=4169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:54.929000 audit: CWD cwd="/etc/service/enabled/felix/log" Sep 13 00:47:54.929000 audit: PATH item=0 name="/dev/fd/63" inode=25586 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:47:54.929000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:47:54.947000 audit[4178]: AVC avc: denied { write } for pid=4178 comm="tee" name="fd" dev="proc" ino=25599 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:47:54.947000 audit[4178]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe585747e3 a2=241 a3=1b6 items=1 ppid=4134 pid=4178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:54.947000 audit: CWD cwd="/etc/service/enabled/bird6/log" Sep 13 00:47:54.947000 audit: PATH item=0 name="/dev/fd/63" inode=25893 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:47:54.947000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:47:54.972243 env[1726]: 2025-09-13 00:47:54.622 [INFO][4113] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e" Sep 13 00:47:54.972243 env[1726]: 2025-09-13 00:47:54.623 [INFO][4113] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e" iface="eth0" netns="/var/run/netns/cni-eec8e441-c800-1a51-cc49-d1af79944aa3" Sep 13 00:47:54.972243 env[1726]: 2025-09-13 00:47:54.624 [INFO][4113] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e" iface="eth0" netns="/var/run/netns/cni-eec8e441-c800-1a51-cc49-d1af79944aa3" Sep 13 00:47:54.972243 env[1726]: 2025-09-13 00:47:54.628 [INFO][4113] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e" iface="eth0" netns="/var/run/netns/cni-eec8e441-c800-1a51-cc49-d1af79944aa3" Sep 13 00:47:54.972243 env[1726]: 2025-09-13 00:47:54.628 [INFO][4113] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e" Sep 13 00:47:54.972243 env[1726]: 2025-09-13 00:47:54.628 [INFO][4113] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e" Sep 13 00:47:54.972243 env[1726]: 2025-09-13 00:47:54.940 [INFO][4121] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e" HandleID="k8s-pod-network.2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e" Workload="ip--172--31--26--227-k8s-whisker--744ff764b6--md9lk-eth0" Sep 13 00:47:54.972243 env[1726]: 2025-09-13 00:47:54.943 [INFO][4121] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:47:54.972243 env[1726]: 2025-09-13 00:47:54.943 [INFO][4121] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:47:54.972243 env[1726]: 2025-09-13 00:47:54.960 [WARNING][4121] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e" HandleID="k8s-pod-network.2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e" Workload="ip--172--31--26--227-k8s-whisker--744ff764b6--md9lk-eth0" Sep 13 00:47:54.972243 env[1726]: 2025-09-13 00:47:54.961 [INFO][4121] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e" HandleID="k8s-pod-network.2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e" Workload="ip--172--31--26--227-k8s-whisker--744ff764b6--md9lk-eth0" Sep 13 00:47:54.972243 env[1726]: 2025-09-13 00:47:54.965 [INFO][4121] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:47:54.972243 env[1726]: 2025-09-13 00:47:54.968 [INFO][4113] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e" Sep 13 00:47:54.981237 env[1726]: time="2025-09-13T00:47:54.972400250Z" level=info msg="TearDown network for sandbox \"2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e\" successfully" Sep 13 00:47:54.981237 env[1726]: time="2025-09-13T00:47:54.972441575Z" level=info msg="StopPodSandbox for \"2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e\" returns successfully" Sep 13 00:47:54.979336 systemd[1]: run-netns-cni\x2deec8e441\x2dc800\x2d1a51\x2dcc49\x2dd1af79944aa3.mount: Deactivated successfully. Sep 13 00:47:54.982000 audit[4194]: AVC avc: denied { write } for pid=4194 comm="tee" name="fd" dev="proc" ino=25924 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:47:54.982000 audit[4194]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd26d6b7e5 a2=241 a3=1b6 items=1 ppid=4135 pid=4194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:54.982000 audit: CWD cwd="/etc/service/enabled/cni/log" Sep 13 00:47:54.982000 audit: PATH item=0 name="/dev/fd/63" inode=25596 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:47:54.982000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:47:54.993000 audit[4199]: AVC avc: denied { write } for pid=4199 comm="tee" name="fd" dev="proc" ino=25928 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:47:54.993000 audit[4199]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff92d007d3 a2=241 a3=1b6 items=1 ppid=4142 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:54.993000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Sep 13 00:47:54.993000 audit: PATH item=0 name="/dev/fd/63" inode=26628 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:47:54.993000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:47:55.001000 audit[4195]: AVC avc: denied { write } for pid=4195 comm="tee" name="fd" dev="proc" ino=26638 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:47:55.001000 audit[4195]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffda32c37d4 a2=241 a3=1b6 items=1 ppid=4138 pid=4195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.001000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Sep 13 00:47:55.001000 audit: PATH item=0 name="/dev/fd/63" inode=25909 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:47:55.001000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:47:55.008000 audit[4201]: AVC avc: denied { write } for pid=4201 comm="tee" name="fd" dev="proc" ino=26642 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:47:55.008000 audit[4201]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffd3e227e4 a2=241 a3=1b6 items=1 ppid=4148 pid=4201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.008000 audit: CWD cwd="/etc/service/enabled/bird/log" Sep 13 00:47:55.008000 audit: PATH item=0 name="/dev/fd/63" inode=26631 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:47:55.008000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:47:55.009000 audit[4204]: AVC avc: denied { write } for pid=4204 comm="tee" name="fd" dev="proc" ino=26646 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:47:55.009000 audit[4204]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeca40b7e3 a2=241 a3=1b6 items=1 ppid=4151 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.009000 audit: CWD cwd="/etc/service/enabled/confd/log" Sep 13 00:47:55.009000 audit: PATH item=0 name="/dev/fd/63" inode=25923 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:47:55.009000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:47:55.077700 kubelet[2611]: I0913 00:47:55.077654 2611 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/73617415-dc3c-42a6-aa92-204e06c5568d-whisker-ca-bundle\") pod \"73617415-dc3c-42a6-aa92-204e06c5568d\" (UID: \"73617415-dc3c-42a6-aa92-204e06c5568d\") " Sep 13 00:47:55.078268 kubelet[2611]: I0913 00:47:55.077735 2611 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/73617415-dc3c-42a6-aa92-204e06c5568d-whisker-backend-key-pair\") pod \"73617415-dc3c-42a6-aa92-204e06c5568d\" (UID: \"73617415-dc3c-42a6-aa92-204e06c5568d\") " Sep 13 00:47:55.078268 kubelet[2611]: I0913 00:47:55.077778 2611 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-x9r8n\" (UniqueName: \"kubernetes.io/projected/73617415-dc3c-42a6-aa92-204e06c5568d-kube-api-access-x9r8n\") pod \"73617415-dc3c-42a6-aa92-204e06c5568d\" (UID: \"73617415-dc3c-42a6-aa92-204e06c5568d\") " Sep 13 00:47:55.086170 kubelet[2611]: I0913 00:47:55.082996 2611 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/73617415-dc3c-42a6-aa92-204e06c5568d-whisker-ca-bundle" (OuterVolumeSpecName: "whisker-ca-bundle") pod "73617415-dc3c-42a6-aa92-204e06c5568d" (UID: "73617415-dc3c-42a6-aa92-204e06c5568d"). InnerVolumeSpecName "whisker-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGIDValue "" Sep 13 00:47:55.097209 systemd[1]: var-lib-kubelet-pods-73617415\x2ddc3c\x2d42a6\x2daa92\x2d204e06c5568d-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dx9r8n.mount: Deactivated successfully. Sep 13 00:47:55.104185 kubelet[2611]: I0913 00:47:55.104133 2611 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/73617415-dc3c-42a6-aa92-204e06c5568d-whisker-backend-key-pair" (OuterVolumeSpecName: "whisker-backend-key-pair") pod "73617415-dc3c-42a6-aa92-204e06c5568d" (UID: "73617415-dc3c-42a6-aa92-204e06c5568d"). InnerVolumeSpecName "whisker-backend-key-pair". PluginName "kubernetes.io/secret", VolumeGIDValue "" Sep 13 00:47:55.104524 kubelet[2611]: I0913 00:47:55.104483 2611 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/73617415-dc3c-42a6-aa92-204e06c5568d-kube-api-access-x9r8n" (OuterVolumeSpecName: "kube-api-access-x9r8n") pod "73617415-dc3c-42a6-aa92-204e06c5568d" (UID: "73617415-dc3c-42a6-aa92-204e06c5568d"). InnerVolumeSpecName "kube-api-access-x9r8n". PluginName "kubernetes.io/projected", VolumeGIDValue "" Sep 13 00:47:55.104972 systemd[1]: var-lib-kubelet-pods-73617415\x2ddc3c\x2d42a6\x2daa92\x2d204e06c5568d-volumes-kubernetes.io\x7esecret-whisker\x2dbackend\x2dkey\x2dpair.mount: Deactivated successfully. Sep 13 00:47:55.182718 kubelet[2611]: I0913 00:47:55.182586 2611 reconciler_common.go:299] "Volume detached for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/73617415-dc3c-42a6-aa92-204e06c5568d-whisker-ca-bundle\") on node \"ip-172-31-26-227\" DevicePath \"\"" Sep 13 00:47:55.182970 kubelet[2611]: I0913 00:47:55.182940 2611 reconciler_common.go:299] "Volume detached for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/73617415-dc3c-42a6-aa92-204e06c5568d-whisker-backend-key-pair\") on node \"ip-172-31-26-227\" DevicePath \"\"" Sep 13 00:47:55.183109 kubelet[2611]: I0913 00:47:55.183094 2611 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-x9r8n\" (UniqueName: \"kubernetes.io/projected/73617415-dc3c-42a6-aa92-204e06c5568d-kube-api-access-x9r8n\") on node \"ip-172-31-26-227\" DevicePath \"\"" Sep 13 00:47:55.511378 kernel: kauditd_printk_skb: 74 callbacks suppressed Sep 13 00:47:55.511604 kernel: audit: type=1400 audit(1757724475.503:970): avc: denied { bpf } for pid=4248 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.517981 kernel: audit: type=1400 audit(1757724475.503:970): avc: denied { bpf } for pid=4248 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.503000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.503000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.503000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.503000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.533366 kernel: audit: type=1400 audit(1757724475.503:970): avc: denied { perfmon } for pid=4248 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.541031 kernel: audit: type=1400 audit(1757724475.503:970): avc: denied { perfmon } for pid=4248 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.541122 kernel: audit: type=1400 audit(1757724475.503:970): avc: denied { perfmon } for pid=4248 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.503000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.503000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.548135 kernel: audit: type=1400 audit(1757724475.503:970): avc: denied { perfmon } for pid=4248 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.503000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.553847 kernel: audit: type=1400 audit(1757724475.503:970): avc: denied { perfmon } for pid=4248 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.553990 kernel: audit: type=1400 audit(1757724475.503:970): avc: denied { bpf } for pid=4248 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.503000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.503000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.565742 kernel: audit: type=1400 audit(1757724475.503:970): avc: denied { bpf } for pid=4248 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.565904 kernel: audit: type=1334 audit(1757724475.503:970): prog-id=146 op=LOAD Sep 13 00:47:55.503000 audit: BPF prog-id=146 op=LOAD Sep 13 00:47:55.503000 audit[4248]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe205250d0 a2=98 a3=1fffffffffffffff items=0 ppid=4141 pid=4248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.503000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:47:55.511000 audit: BPF prog-id=146 op=UNLOAD Sep 13 00:47:55.511000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.511000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.511000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.511000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.511000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.511000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.511000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.511000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.511000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.511000 audit: BPF prog-id=147 op=LOAD Sep 13 00:47:55.511000 audit[4248]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe20524fb0 a2=94 a3=3 items=0 ppid=4141 pid=4248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.511000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:47:55.517000 audit: BPF prog-id=147 op=UNLOAD Sep 13 00:47:55.517000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.517000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.517000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.517000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.517000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.517000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.517000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.517000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.517000 audit[4248]: AVC avc: denied { bpf } for pid=4248 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.517000 audit: BPF prog-id=148 op=LOAD Sep 13 00:47:55.517000 audit[4248]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe20524ff0 a2=94 a3=7ffe205251d0 items=0 ppid=4141 pid=4248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.517000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:47:55.517000 audit: BPF prog-id=148 op=UNLOAD Sep 13 00:47:55.517000 audit[4248]: AVC avc: denied { perfmon } for pid=4248 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.517000 audit[4248]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffe205250c0 a2=50 a3=a000000085 items=0 ppid=4141 pid=4248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.517000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:47:55.518000 audit[4249]: AVC avc: denied { bpf } for pid=4249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.518000 audit[4249]: AVC avc: denied { bpf } for pid=4249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.518000 audit[4249]: AVC avc: denied { perfmon } for pid=4249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.518000 audit[4249]: AVC avc: denied { perfmon } for pid=4249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.518000 audit[4249]: AVC avc: denied { perfmon } for pid=4249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.518000 audit[4249]: AVC avc: denied { perfmon } for pid=4249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.518000 audit[4249]: AVC avc: denied { perfmon } for pid=4249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.518000 audit[4249]: AVC avc: denied { bpf } for pid=4249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.518000 audit[4249]: AVC avc: denied { bpf } for pid=4249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.518000 audit: BPF prog-id=149 op=LOAD Sep 13 00:47:55.518000 audit[4249]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcfad2f910 a2=98 a3=3 items=0 ppid=4141 pid=4249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.518000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:47:55.524000 audit: BPF prog-id=149 op=UNLOAD Sep 13 00:47:55.533000 audit[4249]: AVC avc: denied { bpf } for pid=4249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.533000 audit[4249]: AVC avc: denied { bpf } for pid=4249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.533000 audit[4249]: AVC avc: denied { perfmon } for pid=4249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.533000 audit[4249]: AVC avc: denied { perfmon } for pid=4249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.533000 audit[4249]: AVC avc: denied { perfmon } for pid=4249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.533000 audit[4249]: AVC avc: denied { perfmon } for pid=4249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.533000 audit[4249]: AVC avc: denied { perfmon } for pid=4249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.533000 audit[4249]: AVC avc: denied { bpf } for pid=4249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.533000 audit[4249]: AVC avc: denied { bpf } for pid=4249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.533000 audit: BPF prog-id=150 op=LOAD Sep 13 00:47:55.533000 audit[4249]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcfad2f700 a2=94 a3=54428f items=0 ppid=4141 pid=4249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.533000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:47:55.567000 audit: BPF prog-id=150 op=UNLOAD Sep 13 00:47:55.567000 audit[4249]: AVC avc: denied { bpf } for pid=4249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.567000 audit[4249]: AVC avc: denied { bpf } for pid=4249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.567000 audit[4249]: AVC avc: denied { perfmon } for pid=4249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.567000 audit[4249]: AVC avc: denied { perfmon } for pid=4249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.567000 audit[4249]: AVC avc: denied { perfmon } for pid=4249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.567000 audit[4249]: AVC avc: denied { perfmon } for pid=4249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.567000 audit[4249]: AVC avc: denied { perfmon } for pid=4249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.567000 audit[4249]: AVC avc: denied { bpf } for pid=4249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.567000 audit[4249]: AVC avc: denied { bpf } for pid=4249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.567000 audit: BPF prog-id=151 op=LOAD Sep 13 00:47:55.567000 audit[4249]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcfad2f730 a2=94 a3=2 items=0 ppid=4141 pid=4249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.567000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:47:55.567000 audit: BPF prog-id=151 op=UNLOAD Sep 13 00:47:55.680000 audit[4249]: AVC avc: denied { bpf } for pid=4249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.680000 audit[4249]: AVC avc: denied { bpf } for pid=4249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.680000 audit[4249]: AVC avc: denied { perfmon } for pid=4249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.680000 audit[4249]: AVC avc: denied { perfmon } for pid=4249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.680000 audit[4249]: AVC avc: denied { perfmon } for pid=4249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.680000 audit[4249]: AVC avc: denied { perfmon } for pid=4249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.680000 audit[4249]: AVC avc: denied { perfmon } for pid=4249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.680000 audit[4249]: AVC avc: denied { bpf } for pid=4249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.680000 audit[4249]: AVC avc: denied { bpf } for pid=4249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.680000 audit: BPF prog-id=152 op=LOAD Sep 13 00:47:55.680000 audit[4249]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcfad2f5f0 a2=94 a3=1 items=0 ppid=4141 pid=4249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.680000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:47:55.680000 audit: BPF prog-id=152 op=UNLOAD Sep 13 00:47:55.680000 audit[4249]: AVC avc: denied { perfmon } for pid=4249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.680000 audit[4249]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffcfad2f6c0 a2=50 a3=7ffcfad2f7a0 items=0 ppid=4141 pid=4249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.680000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:47:55.692000 audit[4249]: AVC avc: denied { bpf } for pid=4249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.692000 audit[4249]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcfad2f600 a2=28 a3=0 items=0 ppid=4141 pid=4249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.692000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:47:55.692000 audit[4249]: AVC avc: denied { bpf } for pid=4249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.692000 audit[4249]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcfad2f630 a2=28 a3=0 items=0 ppid=4141 pid=4249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.692000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:47:55.692000 audit[4249]: AVC avc: denied { bpf } for pid=4249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.692000 audit[4249]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcfad2f540 a2=28 a3=0 items=0 ppid=4141 pid=4249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.692000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:47:55.692000 audit[4249]: AVC avc: denied { bpf } for pid=4249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.692000 audit[4249]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcfad2f650 a2=28 a3=0 items=0 ppid=4141 pid=4249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.692000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:47:55.692000 audit[4249]: AVC avc: denied { bpf } for pid=4249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.692000 audit[4249]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcfad2f630 a2=28 a3=0 items=0 ppid=4141 pid=4249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.692000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:47:55.692000 audit[4249]: AVC avc: denied { bpf } for pid=4249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.692000 audit[4249]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcfad2f620 a2=28 a3=0 items=0 ppid=4141 pid=4249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.692000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:47:55.692000 audit[4249]: AVC avc: denied { bpf } for pid=4249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.692000 audit[4249]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcfad2f650 a2=28 a3=0 items=0 ppid=4141 pid=4249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.692000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:47:55.692000 audit[4249]: AVC avc: denied { bpf } for pid=4249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.692000 audit[4249]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcfad2f630 a2=28 a3=0 items=0 ppid=4141 pid=4249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.692000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:47:55.692000 audit[4249]: AVC avc: denied { bpf } for pid=4249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.692000 audit[4249]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcfad2f650 a2=28 a3=0 items=0 ppid=4141 pid=4249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.692000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:47:55.692000 audit[4249]: AVC avc: denied { bpf } for pid=4249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.692000 audit[4249]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcfad2f620 a2=28 a3=0 items=0 ppid=4141 pid=4249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.692000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:47:55.692000 audit[4249]: AVC avc: denied { bpf } for pid=4249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.692000 audit[4249]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcfad2f690 a2=28 a3=0 items=0 ppid=4141 pid=4249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.692000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:47:55.693000 audit[4249]: AVC avc: denied { perfmon } for pid=4249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.693000 audit[4249]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcfad2f440 a2=50 a3=1 items=0 ppid=4141 pid=4249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.693000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:47:55.693000 audit[4249]: AVC avc: denied { bpf } for pid=4249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.693000 audit[4249]: AVC avc: denied { bpf } for pid=4249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.693000 audit[4249]: AVC avc: denied { perfmon } for pid=4249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.693000 audit[4249]: AVC avc: denied { perfmon } for pid=4249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.693000 audit[4249]: AVC avc: denied { perfmon } for pid=4249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.693000 audit[4249]: AVC avc: denied { perfmon } for pid=4249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.693000 audit[4249]: AVC avc: denied { perfmon } for pid=4249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.693000 audit[4249]: AVC avc: denied { bpf } for pid=4249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.693000 audit[4249]: AVC avc: denied { bpf } for pid=4249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.693000 audit: BPF prog-id=153 op=LOAD Sep 13 00:47:55.693000 audit[4249]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcfad2f440 a2=94 a3=5 items=0 ppid=4141 pid=4249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.693000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:47:55.693000 audit: BPF prog-id=153 op=UNLOAD Sep 13 00:47:55.693000 audit[4249]: AVC avc: denied { perfmon } for pid=4249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.693000 audit[4249]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcfad2f4f0 a2=50 a3=1 items=0 ppid=4141 pid=4249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.693000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:47:55.693000 audit[4249]: AVC avc: denied { bpf } for pid=4249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.693000 audit[4249]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffcfad2f610 a2=4 a3=38 items=0 ppid=4141 pid=4249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.693000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:47:55.693000 audit[4249]: AVC avc: denied { bpf } for pid=4249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.693000 audit[4249]: AVC avc: denied { bpf } for pid=4249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.693000 audit[4249]: AVC avc: denied { perfmon } for pid=4249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.693000 audit[4249]: AVC avc: denied { bpf } for pid=4249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.693000 audit[4249]: AVC avc: denied { perfmon } for pid=4249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.693000 audit[4249]: AVC avc: denied { perfmon } for pid=4249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.693000 audit[4249]: AVC avc: denied { perfmon } for pid=4249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.693000 audit[4249]: AVC avc: denied { perfmon } for pid=4249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.693000 audit[4249]: AVC avc: denied { perfmon } for pid=4249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.693000 audit[4249]: AVC avc: denied { bpf } for pid=4249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.693000 audit[4249]: AVC avc: denied { confidentiality } for pid=4249 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:47:55.693000 audit[4249]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcfad2f660 a2=94 a3=6 items=0 ppid=4141 pid=4249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.693000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:47:55.693000 audit[4249]: AVC avc: denied { bpf } for pid=4249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.693000 audit[4249]: AVC avc: denied { bpf } for pid=4249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.693000 audit[4249]: AVC avc: denied { perfmon } for pid=4249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.693000 audit[4249]: AVC avc: denied { bpf } for pid=4249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.693000 audit[4249]: AVC avc: denied { perfmon } for pid=4249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.693000 audit[4249]: AVC avc: denied { perfmon } for pid=4249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.693000 audit[4249]: AVC avc: denied { perfmon } for pid=4249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.693000 audit[4249]: AVC avc: denied { perfmon } for pid=4249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.693000 audit[4249]: AVC avc: denied { perfmon } for pid=4249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.693000 audit[4249]: AVC avc: denied { bpf } for pid=4249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.693000 audit[4249]: AVC avc: denied { confidentiality } for pid=4249 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:47:55.693000 audit[4249]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcfad2ee10 a2=94 a3=88 items=0 ppid=4141 pid=4249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.693000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:47:55.693000 audit[4249]: AVC avc: denied { bpf } for pid=4249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.693000 audit[4249]: AVC avc: denied { bpf } for pid=4249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.693000 audit[4249]: AVC avc: denied { perfmon } for pid=4249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.693000 audit[4249]: AVC avc: denied { bpf } for pid=4249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.693000 audit[4249]: AVC avc: denied { perfmon } for pid=4249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.693000 audit[4249]: AVC avc: denied { perfmon } for pid=4249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.693000 audit[4249]: AVC avc: denied { perfmon } for pid=4249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.693000 audit[4249]: AVC avc: denied { perfmon } for pid=4249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.693000 audit[4249]: AVC avc: denied { perfmon } for pid=4249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.693000 audit[4249]: AVC avc: denied { bpf } for pid=4249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.693000 audit[4249]: AVC avc: denied { confidentiality } for pid=4249 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:47:55.693000 audit[4249]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcfad2ee10 a2=94 a3=88 items=0 ppid=4141 pid=4249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.693000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:47:55.705000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.705000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.705000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.705000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.705000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.705000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.705000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.705000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.705000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.705000 audit: BPF prog-id=154 op=LOAD Sep 13 00:47:55.705000 audit[4252]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcd783ec50 a2=98 a3=1999999999999999 items=0 ppid=4141 pid=4252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.705000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 00:47:55.705000 audit: BPF prog-id=154 op=UNLOAD Sep 13 00:47:55.705000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.705000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.705000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.705000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.705000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.705000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.705000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.705000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.705000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.705000 audit: BPF prog-id=155 op=LOAD Sep 13 00:47:55.705000 audit[4252]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcd783eb30 a2=94 a3=ffff items=0 ppid=4141 pid=4252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.705000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 00:47:55.705000 audit: BPF prog-id=155 op=UNLOAD Sep 13 00:47:55.705000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.705000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.705000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.705000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.705000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.705000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.705000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.705000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.705000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.705000 audit: BPF prog-id=156 op=LOAD Sep 13 00:47:55.705000 audit[4252]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcd783eb70 a2=94 a3=7ffcd783ed50 items=0 ppid=4141 pid=4252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.705000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 00:47:55.705000 audit: BPF prog-id=156 op=UNLOAD Sep 13 00:47:55.803418 (udev-worker)[4078]: Network interface NamePolicy= disabled on kernel command line. Sep 13 00:47:55.807065 systemd-networkd[1456]: vxlan.calico: Link UP Sep 13 00:47:55.807075 systemd-networkd[1456]: vxlan.calico: Gained carrier Sep 13 00:47:55.844527 systemd[1]: Removed slice kubepods-besteffort-pod73617415_dc3c_42a6_aa92_204e06c5568d.slice. Sep 13 00:47:55.876000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.878677 (udev-worker)[4277]: Network interface NamePolicy= disabled on kernel command line. Sep 13 00:47:55.876000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.876000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.876000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.876000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.876000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.876000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.876000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.876000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.876000 audit: BPF prog-id=157 op=LOAD Sep 13 00:47:55.876000 audit[4279]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd0956f3f0 a2=98 a3=0 items=0 ppid=4141 pid=4279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.876000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:47:55.880000 audit: BPF prog-id=157 op=UNLOAD Sep 13 00:47:55.882469 (udev-worker)[4278]: Network interface NamePolicy= disabled on kernel command line. Sep 13 00:47:55.882000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.882000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.882000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.882000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.882000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.882000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.882000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.882000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.882000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.882000 audit: BPF prog-id=158 op=LOAD Sep 13 00:47:55.882000 audit[4279]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd0956f200 a2=94 a3=54428f items=0 ppid=4141 pid=4279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.882000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:47:55.883000 audit: BPF prog-id=158 op=UNLOAD Sep 13 00:47:55.883000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.883000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.883000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.883000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.883000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.883000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.883000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.883000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.883000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.883000 audit: BPF prog-id=159 op=LOAD Sep 13 00:47:55.883000 audit[4279]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd0956f230 a2=94 a3=2 items=0 ppid=4141 pid=4279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.883000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:47:55.886000 audit: BPF prog-id=159 op=UNLOAD Sep 13 00:47:55.886000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.886000 audit[4279]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd0956f100 a2=28 a3=0 items=0 ppid=4141 pid=4279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.886000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:47:55.886000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.886000 audit[4279]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd0956f130 a2=28 a3=0 items=0 ppid=4141 pid=4279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.886000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:47:55.886000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.886000 audit[4279]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd0956f040 a2=28 a3=0 items=0 ppid=4141 pid=4279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.886000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:47:55.886000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.886000 audit[4279]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd0956f150 a2=28 a3=0 items=0 ppid=4141 pid=4279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.886000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:47:55.886000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.886000 audit[4279]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd0956f130 a2=28 a3=0 items=0 ppid=4141 pid=4279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.886000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:47:55.886000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.886000 audit[4279]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd0956f120 a2=28 a3=0 items=0 ppid=4141 pid=4279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.886000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:47:55.886000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.886000 audit[4279]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd0956f150 a2=28 a3=0 items=0 ppid=4141 pid=4279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.886000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:47:55.886000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.886000 audit[4279]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd0956f130 a2=28 a3=0 items=0 ppid=4141 pid=4279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.886000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:47:55.886000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.886000 audit[4279]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd0956f150 a2=28 a3=0 items=0 ppid=4141 pid=4279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.886000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:47:55.886000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.886000 audit[4279]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd0956f120 a2=28 a3=0 items=0 ppid=4141 pid=4279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.886000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:47:55.886000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.886000 audit[4279]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd0956f190 a2=28 a3=0 items=0 ppid=4141 pid=4279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.886000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:47:55.886000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.886000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.886000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.886000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.886000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.886000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.886000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.886000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.886000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.886000 audit: BPF prog-id=160 op=LOAD Sep 13 00:47:55.886000 audit[4279]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd0956f000 a2=94 a3=0 items=0 ppid=4141 pid=4279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.886000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:47:55.886000 audit: BPF prog-id=160 op=UNLOAD Sep 13 00:47:55.887000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.887000 audit[4279]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffd0956eff0 a2=50 a3=2800 items=0 ppid=4141 pid=4279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.887000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:47:55.898000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.898000 audit[4279]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffd0956eff0 a2=50 a3=2800 items=0 ppid=4141 pid=4279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.898000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:47:55.898000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.898000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.898000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.898000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.898000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.898000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.898000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.898000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.898000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.898000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.898000 audit: BPF prog-id=161 op=LOAD Sep 13 00:47:55.898000 audit[4279]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd0956e810 a2=94 a3=2 items=0 ppid=4141 pid=4279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.898000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:47:55.899000 audit: BPF prog-id=161 op=UNLOAD Sep 13 00:47:55.899000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.899000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.899000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.899000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.899000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.899000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.899000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.899000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.899000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.899000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.899000 audit: BPF prog-id=162 op=LOAD Sep 13 00:47:55.899000 audit[4279]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd0956e910 a2=94 a3=30 items=0 ppid=4141 pid=4279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.899000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:47:55.905000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.905000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.905000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.905000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.905000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.905000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.905000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.905000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.905000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.905000 audit: BPF prog-id=163 op=LOAD Sep 13 00:47:55.905000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffcc9fe460 a2=98 a3=0 items=0 ppid=4141 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.905000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:47:55.905000 audit: BPF prog-id=163 op=UNLOAD Sep 13 00:47:55.906000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.906000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.906000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.906000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.906000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.906000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.906000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.906000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.906000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.906000 audit: BPF prog-id=164 op=LOAD Sep 13 00:47:55.906000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffcc9fe250 a2=94 a3=54428f items=0 ppid=4141 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.906000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:47:55.906000 audit: BPF prog-id=164 op=UNLOAD Sep 13 00:47:55.906000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.906000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.906000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.906000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.906000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.906000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.906000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.906000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.906000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:55.906000 audit: BPF prog-id=165 op=LOAD Sep 13 00:47:55.906000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffcc9fe280 a2=94 a3=2 items=0 ppid=4141 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:55.906000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:47:55.906000 audit: BPF prog-id=165 op=UNLOAD Sep 13 00:47:56.043971 systemd[1]: Created slice kubepods-besteffort-pode4b90a23_fdcd_4bff_8e89_5573185c9b66.slice. Sep 13 00:47:56.090596 kubelet[2611]: I0913 00:47:56.090459 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-d4n7p\" (UniqueName: \"kubernetes.io/projected/e4b90a23-fdcd-4bff-8e89-5573185c9b66-kube-api-access-d4n7p\") pod \"whisker-59b7b6cb85-k5tqr\" (UID: \"e4b90a23-fdcd-4bff-8e89-5573185c9b66\") " pod="calico-system/whisker-59b7b6cb85-k5tqr" Sep 13 00:47:56.091160 kubelet[2611]: I0913 00:47:56.091139 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/e4b90a23-fdcd-4bff-8e89-5573185c9b66-whisker-backend-key-pair\") pod \"whisker-59b7b6cb85-k5tqr\" (UID: \"e4b90a23-fdcd-4bff-8e89-5573185c9b66\") " pod="calico-system/whisker-59b7b6cb85-k5tqr" Sep 13 00:47:56.091306 kubelet[2611]: I0913 00:47:56.091286 2611 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/e4b90a23-fdcd-4bff-8e89-5573185c9b66-whisker-ca-bundle\") pod \"whisker-59b7b6cb85-k5tqr\" (UID: \"e4b90a23-fdcd-4bff-8e89-5573185c9b66\") " pod="calico-system/whisker-59b7b6cb85-k5tqr" Sep 13 00:47:56.124000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.124000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.124000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.124000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.124000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.124000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.124000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.124000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.124000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.124000 audit: BPF prog-id=166 op=LOAD Sep 13 00:47:56.124000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffcc9fe140 a2=94 a3=1 items=0 ppid=4141 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:56.124000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:47:56.124000 audit: BPF prog-id=166 op=UNLOAD Sep 13 00:47:56.124000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.124000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fffcc9fe210 a2=50 a3=7fffcc9fe2f0 items=0 ppid=4141 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:56.124000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:47:56.135000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.135000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffcc9fe150 a2=28 a3=0 items=0 ppid=4141 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:56.135000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:47:56.135000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.135000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffcc9fe180 a2=28 a3=0 items=0 ppid=4141 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:56.135000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:47:56.135000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.135000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffcc9fe090 a2=28 a3=0 items=0 ppid=4141 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:56.135000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:47:56.135000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.135000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffcc9fe1a0 a2=28 a3=0 items=0 ppid=4141 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:56.135000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:47:56.135000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.135000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffcc9fe180 a2=28 a3=0 items=0 ppid=4141 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:56.135000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:47:56.135000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.135000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffcc9fe170 a2=28 a3=0 items=0 ppid=4141 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:56.135000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:47:56.135000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.135000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffcc9fe1a0 a2=28 a3=0 items=0 ppid=4141 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:56.135000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:47:56.135000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.135000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffcc9fe180 a2=28 a3=0 items=0 ppid=4141 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:56.135000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:47:56.135000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.135000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffcc9fe1a0 a2=28 a3=0 items=0 ppid=4141 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:56.135000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:47:56.135000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.135000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffcc9fe170 a2=28 a3=0 items=0 ppid=4141 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:56.135000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:47:56.135000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.135000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffcc9fe1e0 a2=28 a3=0 items=0 ppid=4141 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:56.135000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:47:56.136000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.136000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffcc9fdf90 a2=50 a3=1 items=0 ppid=4141 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:56.136000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:47:56.136000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.136000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.136000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.136000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.136000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.136000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.136000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.136000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.136000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.136000 audit: BPF prog-id=167 op=LOAD Sep 13 00:47:56.136000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffcc9fdf90 a2=94 a3=5 items=0 ppid=4141 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:56.136000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:47:56.136000 audit: BPF prog-id=167 op=UNLOAD Sep 13 00:47:56.136000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.136000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffcc9fe040 a2=50 a3=1 items=0 ppid=4141 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:56.136000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:47:56.136000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.136000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fffcc9fe160 a2=4 a3=38 items=0 ppid=4141 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:56.136000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:47:56.136000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.136000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.136000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.136000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.136000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.136000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.136000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.136000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.136000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.136000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.136000 audit[4285]: AVC avc: denied { confidentiality } for pid=4285 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:47:56.136000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffcc9fe1b0 a2=94 a3=6 items=0 ppid=4141 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:56.136000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:47:56.136000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.136000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.136000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.136000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.136000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.136000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.136000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.136000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.136000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.136000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.136000 audit[4285]: AVC avc: denied { confidentiality } for pid=4285 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:47:56.136000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffcc9fd960 a2=94 a3=88 items=0 ppid=4141 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:56.136000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:47:56.137000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.137000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.137000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.137000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.137000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.137000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.137000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.137000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.137000 audit[4285]: AVC avc: denied { perfmon } for pid=4285 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.137000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.137000 audit[4285]: AVC avc: denied { confidentiality } for pid=4285 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:47:56.137000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffcc9fd960 a2=94 a3=88 items=0 ppid=4141 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:56.137000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:47:56.137000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.137000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffcc9ff390 a2=10 a3=f8f00800 items=0 ppid=4141 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:56.137000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:47:56.137000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.137000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffcc9ff230 a2=10 a3=3 items=0 ppid=4141 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:56.137000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:47:56.138000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.138000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffcc9ff1d0 a2=10 a3=3 items=0 ppid=4141 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:56.138000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:47:56.138000 audit[4285]: AVC avc: denied { bpf } for pid=4285 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.138000 audit[4285]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffcc9ff1d0 a2=10 a3=7 items=0 ppid=4141 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:56.138000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:47:56.148000 audit: BPF prog-id=162 op=UNLOAD Sep 13 00:47:56.267000 audit[4312]: NETFILTER_CFG table=mangle:101 family=2 entries=16 op=nft_register_chain pid=4312 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:47:56.267000 audit[4312]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffd733688f0 a2=0 a3=7ffd733688dc items=0 ppid=4141 pid=4312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:56.267000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:47:56.279000 audit[4310]: NETFILTER_CFG table=nat:102 family=2 entries=15 op=nft_register_chain pid=4310 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:47:56.280000 audit[4311]: NETFILTER_CFG table=filter:103 family=2 entries=39 op=nft_register_chain pid=4311 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:47:56.279000 audit[4310]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fffa72601d0 a2=0 a3=7fffa72601bc items=0 ppid=4141 pid=4310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:56.279000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:47:56.280000 audit[4311]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffd1cda6a60 a2=0 a3=7ffd1cda6a4c items=0 ppid=4141 pid=4311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:56.280000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:47:56.286000 audit[4309]: NETFILTER_CFG table=raw:104 family=2 entries=21 op=nft_register_chain pid=4309 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:47:56.286000 audit[4309]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffdc8740020 a2=0 a3=7ffdc874000c items=0 ppid=4141 pid=4309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:56.286000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:47:56.354449 env[1726]: time="2025-09-13T00:47:56.354382306Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-59b7b6cb85-k5tqr,Uid:e4b90a23-fdcd-4bff-8e89-5573185c9b66,Namespace:calico-system,Attempt:0,}" Sep 13 00:47:56.496633 kubelet[2611]: I0913 00:47:56.496588 2611 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="73617415-dc3c-42a6-aa92-204e06c5568d" path="/var/lib/kubelet/pods/73617415-dc3c-42a6-aa92-204e06c5568d/volumes" Sep 13 00:47:56.557835 systemd-networkd[1456]: calicc39b679a9d: Link UP Sep 13 00:47:56.560588 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calicc39b679a9d: link becomes ready Sep 13 00:47:56.560708 systemd-networkd[1456]: calicc39b679a9d: Gained carrier Sep 13 00:47:56.583969 env[1726]: 2025-09-13 00:47:56.434 [INFO][4321] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--26--227-k8s-whisker--59b7b6cb85--k5tqr-eth0 whisker-59b7b6cb85- calico-system e4b90a23-fdcd-4bff-8e89-5573185c9b66 931 0 2025-09-13 00:47:55 +0000 UTC map[app.kubernetes.io/name:whisker k8s-app:whisker pod-template-hash:59b7b6cb85 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:whisker] map[] [] [] []} {k8s ip-172-31-26-227 whisker-59b7b6cb85-k5tqr eth0 whisker [] [] [kns.calico-system ksa.calico-system.whisker] calicc39b679a9d [] [] }} ContainerID="822724b1f27c183483b6c3b0a5ea01d2376c70f5f08c9f37b6cf4972fb8d0d6b" Namespace="calico-system" Pod="whisker-59b7b6cb85-k5tqr" WorkloadEndpoint="ip--172--31--26--227-k8s-whisker--59b7b6cb85--k5tqr-" Sep 13 00:47:56.583969 env[1726]: 2025-09-13 00:47:56.435 [INFO][4321] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="822724b1f27c183483b6c3b0a5ea01d2376c70f5f08c9f37b6cf4972fb8d0d6b" Namespace="calico-system" Pod="whisker-59b7b6cb85-k5tqr" WorkloadEndpoint="ip--172--31--26--227-k8s-whisker--59b7b6cb85--k5tqr-eth0" Sep 13 00:47:56.583969 env[1726]: 2025-09-13 00:47:56.483 [INFO][4334] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="822724b1f27c183483b6c3b0a5ea01d2376c70f5f08c9f37b6cf4972fb8d0d6b" HandleID="k8s-pod-network.822724b1f27c183483b6c3b0a5ea01d2376c70f5f08c9f37b6cf4972fb8d0d6b" Workload="ip--172--31--26--227-k8s-whisker--59b7b6cb85--k5tqr-eth0" Sep 13 00:47:56.583969 env[1726]: 2025-09-13 00:47:56.483 [INFO][4334] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="822724b1f27c183483b6c3b0a5ea01d2376c70f5f08c9f37b6cf4972fb8d0d6b" HandleID="k8s-pod-network.822724b1f27c183483b6c3b0a5ea01d2376c70f5f08c9f37b6cf4972fb8d0d6b" Workload="ip--172--31--26--227-k8s-whisker--59b7b6cb85--k5tqr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002c9210), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-26-227", "pod":"whisker-59b7b6cb85-k5tqr", "timestamp":"2025-09-13 00:47:56.483268558 +0000 UTC"}, Hostname:"ip-172-31-26-227", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:47:56.583969 env[1726]: 2025-09-13 00:47:56.483 [INFO][4334] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:47:56.583969 env[1726]: 2025-09-13 00:47:56.483 [INFO][4334] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:47:56.583969 env[1726]: 2025-09-13 00:47:56.483 [INFO][4334] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-26-227' Sep 13 00:47:56.583969 env[1726]: 2025-09-13 00:47:56.497 [INFO][4334] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.822724b1f27c183483b6c3b0a5ea01d2376c70f5f08c9f37b6cf4972fb8d0d6b" host="ip-172-31-26-227" Sep 13 00:47:56.583969 env[1726]: 2025-09-13 00:47:56.513 [INFO][4334] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-26-227" Sep 13 00:47:56.583969 env[1726]: 2025-09-13 00:47:56.519 [INFO][4334] ipam/ipam.go 511: Trying affinity for 192.168.43.64/26 host="ip-172-31-26-227" Sep 13 00:47:56.583969 env[1726]: 2025-09-13 00:47:56.521 [INFO][4334] ipam/ipam.go 158: Attempting to load block cidr=192.168.43.64/26 host="ip-172-31-26-227" Sep 13 00:47:56.583969 env[1726]: 2025-09-13 00:47:56.524 [INFO][4334] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.43.64/26 host="ip-172-31-26-227" Sep 13 00:47:56.583969 env[1726]: 2025-09-13 00:47:56.524 [INFO][4334] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.43.64/26 handle="k8s-pod-network.822724b1f27c183483b6c3b0a5ea01d2376c70f5f08c9f37b6cf4972fb8d0d6b" host="ip-172-31-26-227" Sep 13 00:47:56.583969 env[1726]: 2025-09-13 00:47:56.528 [INFO][4334] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.822724b1f27c183483b6c3b0a5ea01d2376c70f5f08c9f37b6cf4972fb8d0d6b Sep 13 00:47:56.583969 env[1726]: 2025-09-13 00:47:56.537 [INFO][4334] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.43.64/26 handle="k8s-pod-network.822724b1f27c183483b6c3b0a5ea01d2376c70f5f08c9f37b6cf4972fb8d0d6b" host="ip-172-31-26-227" Sep 13 00:47:56.583969 env[1726]: 2025-09-13 00:47:56.544 [INFO][4334] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.43.65/26] block=192.168.43.64/26 handle="k8s-pod-network.822724b1f27c183483b6c3b0a5ea01d2376c70f5f08c9f37b6cf4972fb8d0d6b" host="ip-172-31-26-227" Sep 13 00:47:56.583969 env[1726]: 2025-09-13 00:47:56.544 [INFO][4334] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.43.65/26] handle="k8s-pod-network.822724b1f27c183483b6c3b0a5ea01d2376c70f5f08c9f37b6cf4972fb8d0d6b" host="ip-172-31-26-227" Sep 13 00:47:56.583969 env[1726]: 2025-09-13 00:47:56.544 [INFO][4334] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:47:56.583969 env[1726]: 2025-09-13 00:47:56.544 [INFO][4334] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.43.65/26] IPv6=[] ContainerID="822724b1f27c183483b6c3b0a5ea01d2376c70f5f08c9f37b6cf4972fb8d0d6b" HandleID="k8s-pod-network.822724b1f27c183483b6c3b0a5ea01d2376c70f5f08c9f37b6cf4972fb8d0d6b" Workload="ip--172--31--26--227-k8s-whisker--59b7b6cb85--k5tqr-eth0" Sep 13 00:47:56.585031 env[1726]: 2025-09-13 00:47:56.550 [INFO][4321] cni-plugin/k8s.go 418: Populated endpoint ContainerID="822724b1f27c183483b6c3b0a5ea01d2376c70f5f08c9f37b6cf4972fb8d0d6b" Namespace="calico-system" Pod="whisker-59b7b6cb85-k5tqr" WorkloadEndpoint="ip--172--31--26--227-k8s-whisker--59b7b6cb85--k5tqr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--227-k8s-whisker--59b7b6cb85--k5tqr-eth0", GenerateName:"whisker-59b7b6cb85-", Namespace:"calico-system", SelfLink:"", UID:"e4b90a23-fdcd-4bff-8e89-5573185c9b66", ResourceVersion:"931", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 47, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"59b7b6cb85", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-227", ContainerID:"", Pod:"whisker-59b7b6cb85-k5tqr", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.43.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"calicc39b679a9d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:47:56.585031 env[1726]: 2025-09-13 00:47:56.550 [INFO][4321] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.43.65/32] ContainerID="822724b1f27c183483b6c3b0a5ea01d2376c70f5f08c9f37b6cf4972fb8d0d6b" Namespace="calico-system" Pod="whisker-59b7b6cb85-k5tqr" WorkloadEndpoint="ip--172--31--26--227-k8s-whisker--59b7b6cb85--k5tqr-eth0" Sep 13 00:47:56.585031 env[1726]: 2025-09-13 00:47:56.550 [INFO][4321] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calicc39b679a9d ContainerID="822724b1f27c183483b6c3b0a5ea01d2376c70f5f08c9f37b6cf4972fb8d0d6b" Namespace="calico-system" Pod="whisker-59b7b6cb85-k5tqr" WorkloadEndpoint="ip--172--31--26--227-k8s-whisker--59b7b6cb85--k5tqr-eth0" Sep 13 00:47:56.585031 env[1726]: 2025-09-13 00:47:56.561 [INFO][4321] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="822724b1f27c183483b6c3b0a5ea01d2376c70f5f08c9f37b6cf4972fb8d0d6b" Namespace="calico-system" Pod="whisker-59b7b6cb85-k5tqr" WorkloadEndpoint="ip--172--31--26--227-k8s-whisker--59b7b6cb85--k5tqr-eth0" Sep 13 00:47:56.585031 env[1726]: 2025-09-13 00:47:56.562 [INFO][4321] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="822724b1f27c183483b6c3b0a5ea01d2376c70f5f08c9f37b6cf4972fb8d0d6b" Namespace="calico-system" Pod="whisker-59b7b6cb85-k5tqr" WorkloadEndpoint="ip--172--31--26--227-k8s-whisker--59b7b6cb85--k5tqr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--227-k8s-whisker--59b7b6cb85--k5tqr-eth0", GenerateName:"whisker-59b7b6cb85-", Namespace:"calico-system", SelfLink:"", UID:"e4b90a23-fdcd-4bff-8e89-5573185c9b66", ResourceVersion:"931", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 47, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"59b7b6cb85", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-227", ContainerID:"822724b1f27c183483b6c3b0a5ea01d2376c70f5f08c9f37b6cf4972fb8d0d6b", Pod:"whisker-59b7b6cb85-k5tqr", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.43.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"calicc39b679a9d", MAC:"16:8a:8c:ac:19:08", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:47:56.585031 env[1726]: 2025-09-13 00:47:56.576 [INFO][4321] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="822724b1f27c183483b6c3b0a5ea01d2376c70f5f08c9f37b6cf4972fb8d0d6b" Namespace="calico-system" Pod="whisker-59b7b6cb85-k5tqr" WorkloadEndpoint="ip--172--31--26--227-k8s-whisker--59b7b6cb85--k5tqr-eth0" Sep 13 00:47:56.609285 env[1726]: time="2025-09-13T00:47:56.609105684Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:47:56.609462 env[1726]: time="2025-09-13T00:47:56.609180090Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:47:56.609462 env[1726]: time="2025-09-13T00:47:56.609196161Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:47:56.611726 env[1726]: time="2025-09-13T00:47:56.610854853Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/822724b1f27c183483b6c3b0a5ea01d2376c70f5f08c9f37b6cf4972fb8d0d6b pid=4358 runtime=io.containerd.runc.v2 Sep 13 00:47:56.637258 systemd[1]: Started cri-containerd-822724b1f27c183483b6c3b0a5ea01d2376c70f5f08c9f37b6cf4972fb8d0d6b.scope. Sep 13 00:47:56.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.663000 audit: BPF prog-id=168 op=LOAD Sep 13 00:47:56.664000 audit[4367]: AVC avc: denied { bpf } for pid=4367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.664000 audit[4367]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4358 pid=4367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:56.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832323732346231663237633138333438336236633362306135656130 Sep 13 00:47:56.665000 audit[4367]: AVC avc: denied { perfmon } for pid=4367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.665000 audit[4367]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4358 pid=4367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:56.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832323732346231663237633138333438336236633362306135656130 Sep 13 00:47:56.665000 audit[4367]: AVC avc: denied { bpf } for pid=4367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.665000 audit[4367]: AVC avc: denied { bpf } for pid=4367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.665000 audit[4367]: AVC avc: denied { bpf } for pid=4367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.665000 audit[4367]: AVC avc: denied { perfmon } for pid=4367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.665000 audit[4367]: AVC avc: denied { perfmon } for pid=4367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.665000 audit[4367]: AVC avc: denied { perfmon } for pid=4367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.665000 audit[4367]: AVC avc: denied { perfmon } for pid=4367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.665000 audit[4367]: AVC avc: denied { perfmon } for pid=4367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.665000 audit[4367]: AVC avc: denied { bpf } for pid=4367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.665000 audit[4367]: AVC avc: denied { bpf } for pid=4367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.665000 audit: BPF prog-id=169 op=LOAD Sep 13 00:47:56.665000 audit[4367]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000329060 items=0 ppid=4358 pid=4367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:56.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832323732346231663237633138333438336236633362306135656130 Sep 13 00:47:56.666000 audit[4367]: AVC avc: denied { bpf } for pid=4367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.666000 audit[4367]: AVC avc: denied { bpf } for pid=4367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.666000 audit[4367]: AVC avc: denied { perfmon } for pid=4367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.666000 audit[4367]: AVC avc: denied { perfmon } for pid=4367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.666000 audit[4367]: AVC avc: denied { perfmon } for pid=4367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.666000 audit[4367]: AVC avc: denied { perfmon } for pid=4367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.666000 audit[4367]: AVC avc: denied { perfmon } for pid=4367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.666000 audit[4367]: AVC avc: denied { bpf } for pid=4367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.666000 audit[4367]: AVC avc: denied { bpf } for pid=4367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.666000 audit: BPF prog-id=170 op=LOAD Sep 13 00:47:56.635000 audit[4370]: NETFILTER_CFG table=filter:105 family=2 entries=59 op=nft_register_chain pid=4370 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:47:56.635000 audit[4370]: SYSCALL arch=c000003e syscall=46 success=yes exit=35860 a0=3 a1=7ffcbab31390 a2=0 a3=7ffcbab3137c items=0 ppid=4141 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:56.635000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:47:56.666000 audit[4367]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003290a8 items=0 ppid=4358 pid=4367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:56.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832323732346231663237633138333438336236633362306135656130 Sep 13 00:47:56.667000 audit: BPF prog-id=170 op=UNLOAD Sep 13 00:47:56.667000 audit: BPF prog-id=169 op=UNLOAD Sep 13 00:47:56.667000 audit[4367]: AVC avc: denied { bpf } for pid=4367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.667000 audit[4367]: AVC avc: denied { bpf } for pid=4367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.667000 audit[4367]: AVC avc: denied { bpf } for pid=4367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.667000 audit[4367]: AVC avc: denied { perfmon } for pid=4367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.667000 audit[4367]: AVC avc: denied { perfmon } for pid=4367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.667000 audit[4367]: AVC avc: denied { perfmon } for pid=4367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.667000 audit[4367]: AVC avc: denied { perfmon } for pid=4367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.667000 audit[4367]: AVC avc: denied { perfmon } for pid=4367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.667000 audit[4367]: AVC avc: denied { bpf } for pid=4367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.667000 audit[4367]: AVC avc: denied { bpf } for pid=4367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:56.667000 audit: BPF prog-id=171 op=LOAD Sep 13 00:47:56.667000 audit[4367]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003294b8 items=0 ppid=4358 pid=4367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:56.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832323732346231663237633138333438336236633362306135656130 Sep 13 00:47:56.702195 env[1726]: time="2025-09-13T00:47:56.702148714Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-59b7b6cb85-k5tqr,Uid:e4b90a23-fdcd-4bff-8e89-5573185c9b66,Namespace:calico-system,Attempt:0,} returns sandbox id \"822724b1f27c183483b6c3b0a5ea01d2376c70f5f08c9f37b6cf4972fb8d0d6b\"" Sep 13 00:47:56.707537 env[1726]: time="2025-09-13T00:47:56.707493715Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.3\"" Sep 13 00:47:56.982609 systemd-networkd[1456]: vxlan.calico: Gained IPv6LL Sep 13 00:47:57.492813 env[1726]: time="2025-09-13T00:47:57.492777170Z" level=info msg="StopPodSandbox for \"5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d\"" Sep 13 00:47:57.493192 env[1726]: time="2025-09-13T00:47:57.493168009Z" level=info msg="StopPodSandbox for \"9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41\"" Sep 13 00:47:57.665311 env[1726]: 2025-09-13 00:47:57.572 [INFO][4416] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41" Sep 13 00:47:57.665311 env[1726]: 2025-09-13 00:47:57.573 [INFO][4416] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41" iface="eth0" netns="/var/run/netns/cni-732921ba-83ed-d28b-4a64-538c6e6aa81f" Sep 13 00:47:57.665311 env[1726]: 2025-09-13 00:47:57.573 [INFO][4416] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41" iface="eth0" netns="/var/run/netns/cni-732921ba-83ed-d28b-4a64-538c6e6aa81f" Sep 13 00:47:57.665311 env[1726]: 2025-09-13 00:47:57.574 [INFO][4416] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41" iface="eth0" netns="/var/run/netns/cni-732921ba-83ed-d28b-4a64-538c6e6aa81f" Sep 13 00:47:57.665311 env[1726]: 2025-09-13 00:47:57.574 [INFO][4416] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41" Sep 13 00:47:57.665311 env[1726]: 2025-09-13 00:47:57.574 [INFO][4416] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41" Sep 13 00:47:57.665311 env[1726]: 2025-09-13 00:47:57.649 [INFO][4430] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41" HandleID="k8s-pod-network.9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41" Workload="ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--m8hcv-eth0" Sep 13 00:47:57.665311 env[1726]: 2025-09-13 00:47:57.649 [INFO][4430] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:47:57.665311 env[1726]: 2025-09-13 00:47:57.649 [INFO][4430] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:47:57.665311 env[1726]: 2025-09-13 00:47:57.656 [WARNING][4430] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41" HandleID="k8s-pod-network.9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41" Workload="ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--m8hcv-eth0" Sep 13 00:47:57.665311 env[1726]: 2025-09-13 00:47:57.656 [INFO][4430] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41" HandleID="k8s-pod-network.9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41" Workload="ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--m8hcv-eth0" Sep 13 00:47:57.665311 env[1726]: 2025-09-13 00:47:57.657 [INFO][4430] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:47:57.665311 env[1726]: 2025-09-13 00:47:57.662 [INFO][4416] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41" Sep 13 00:47:57.671085 env[1726]: time="2025-09-13T00:47:57.669751544Z" level=info msg="TearDown network for sandbox \"9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41\" successfully" Sep 13 00:47:57.671085 env[1726]: time="2025-09-13T00:47:57.670203306Z" level=info msg="StopPodSandbox for \"9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41\" returns successfully" Sep 13 00:47:57.669606 systemd[1]: run-netns-cni\x2d732921ba\x2d83ed\x2dd28b\x2d4a64\x2d538c6e6aa81f.mount: Deactivated successfully. Sep 13 00:47:57.671534 env[1726]: time="2025-09-13T00:47:57.671448161Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75d655b7b-m8hcv,Uid:e8d89abb-6036-40eb-8686-f59fb32e8978,Namespace:calico-apiserver,Attempt:1,}" Sep 13 00:47:57.679349 env[1726]: 2025-09-13 00:47:57.593 [INFO][4418] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d" Sep 13 00:47:57.679349 env[1726]: 2025-09-13 00:47:57.593 [INFO][4418] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d" iface="eth0" netns="/var/run/netns/cni-514270cd-2ae5-76f0-4037-19c107acedb9" Sep 13 00:47:57.679349 env[1726]: 2025-09-13 00:47:57.593 [INFO][4418] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d" iface="eth0" netns="/var/run/netns/cni-514270cd-2ae5-76f0-4037-19c107acedb9" Sep 13 00:47:57.679349 env[1726]: 2025-09-13 00:47:57.595 [INFO][4418] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d" iface="eth0" netns="/var/run/netns/cni-514270cd-2ae5-76f0-4037-19c107acedb9" Sep 13 00:47:57.679349 env[1726]: 2025-09-13 00:47:57.595 [INFO][4418] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d" Sep 13 00:47:57.679349 env[1726]: 2025-09-13 00:47:57.595 [INFO][4418] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d" Sep 13 00:47:57.679349 env[1726]: 2025-09-13 00:47:57.650 [INFO][4435] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d" HandleID="k8s-pod-network.5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d" Workload="ip--172--31--26--227-k8s-calico--kube--controllers--c859df7bc--8p7k4-eth0" Sep 13 00:47:57.679349 env[1726]: 2025-09-13 00:47:57.650 [INFO][4435] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:47:57.679349 env[1726]: 2025-09-13 00:47:57.657 [INFO][4435] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:47:57.679349 env[1726]: 2025-09-13 00:47:57.672 [WARNING][4435] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d" HandleID="k8s-pod-network.5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d" Workload="ip--172--31--26--227-k8s-calico--kube--controllers--c859df7bc--8p7k4-eth0" Sep 13 00:47:57.679349 env[1726]: 2025-09-13 00:47:57.672 [INFO][4435] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d" HandleID="k8s-pod-network.5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d" Workload="ip--172--31--26--227-k8s-calico--kube--controllers--c859df7bc--8p7k4-eth0" Sep 13 00:47:57.679349 env[1726]: 2025-09-13 00:47:57.674 [INFO][4435] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:47:57.679349 env[1726]: 2025-09-13 00:47:57.676 [INFO][4418] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d" Sep 13 00:47:57.685045 env[1726]: time="2025-09-13T00:47:57.683123897Z" level=info msg="TearDown network for sandbox \"5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d\" successfully" Sep 13 00:47:57.685045 env[1726]: time="2025-09-13T00:47:57.683169602Z" level=info msg="StopPodSandbox for \"5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d\" returns successfully" Sep 13 00:47:57.683186 systemd[1]: run-netns-cni\x2d514270cd\x2d2ae5\x2d76f0\x2d4037\x2d19c107acedb9.mount: Deactivated successfully. Sep 13 00:47:57.686407 env[1726]: time="2025-09-13T00:47:57.686363758Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-c859df7bc-8p7k4,Uid:16d0b1a9-37f6-4d2e-b8a8-ba59e19f0516,Namespace:calico-system,Attempt:1,}" Sep 13 00:47:57.894059 systemd-networkd[1456]: cali2543d660658: Link UP Sep 13 00:47:57.898027 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:47:57.898175 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2543d660658: link becomes ready Sep 13 00:47:57.898310 systemd-networkd[1456]: cali2543d660658: Gained carrier Sep 13 00:47:57.916125 env[1726]: 2025-09-13 00:47:57.769 [INFO][4444] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--m8hcv-eth0 calico-apiserver-75d655b7b- calico-apiserver e8d89abb-6036-40eb-8686-f59fb32e8978 942 0 2025-09-13 00:47:29 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:75d655b7b projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-26-227 calico-apiserver-75d655b7b-m8hcv eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali2543d660658 [] [] }} ContainerID="c1c488c5db2d36aa6721803e4822b9c4777c4a78b7bb4679bbe3fe82d2a5b7f6" Namespace="calico-apiserver" Pod="calico-apiserver-75d655b7b-m8hcv" WorkloadEndpoint="ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--m8hcv-" Sep 13 00:47:57.916125 env[1726]: 2025-09-13 00:47:57.769 [INFO][4444] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="c1c488c5db2d36aa6721803e4822b9c4777c4a78b7bb4679bbe3fe82d2a5b7f6" Namespace="calico-apiserver" Pod="calico-apiserver-75d655b7b-m8hcv" WorkloadEndpoint="ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--m8hcv-eth0" Sep 13 00:47:57.916125 env[1726]: 2025-09-13 00:47:57.833 [INFO][4467] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c1c488c5db2d36aa6721803e4822b9c4777c4a78b7bb4679bbe3fe82d2a5b7f6" HandleID="k8s-pod-network.c1c488c5db2d36aa6721803e4822b9c4777c4a78b7bb4679bbe3fe82d2a5b7f6" Workload="ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--m8hcv-eth0" Sep 13 00:47:57.916125 env[1726]: 2025-09-13 00:47:57.834 [INFO][4467] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c1c488c5db2d36aa6721803e4822b9c4777c4a78b7bb4679bbe3fe82d2a5b7f6" HandleID="k8s-pod-network.c1c488c5db2d36aa6721803e4822b9c4777c4a78b7bb4679bbe3fe82d2a5b7f6" Workload="ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--m8hcv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000325490), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-26-227", "pod":"calico-apiserver-75d655b7b-m8hcv", "timestamp":"2025-09-13 00:47:57.833585839 +0000 UTC"}, Hostname:"ip-172-31-26-227", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:47:57.916125 env[1726]: 2025-09-13 00:47:57.834 [INFO][4467] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:47:57.916125 env[1726]: 2025-09-13 00:47:57.834 [INFO][4467] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:47:57.916125 env[1726]: 2025-09-13 00:47:57.834 [INFO][4467] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-26-227' Sep 13 00:47:57.916125 env[1726]: 2025-09-13 00:47:57.849 [INFO][4467] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.c1c488c5db2d36aa6721803e4822b9c4777c4a78b7bb4679bbe3fe82d2a5b7f6" host="ip-172-31-26-227" Sep 13 00:47:57.916125 env[1726]: 2025-09-13 00:47:57.855 [INFO][4467] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-26-227" Sep 13 00:47:57.916125 env[1726]: 2025-09-13 00:47:57.863 [INFO][4467] ipam/ipam.go 511: Trying affinity for 192.168.43.64/26 host="ip-172-31-26-227" Sep 13 00:47:57.916125 env[1726]: 2025-09-13 00:47:57.865 [INFO][4467] ipam/ipam.go 158: Attempting to load block cidr=192.168.43.64/26 host="ip-172-31-26-227" Sep 13 00:47:57.916125 env[1726]: 2025-09-13 00:47:57.868 [INFO][4467] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.43.64/26 host="ip-172-31-26-227" Sep 13 00:47:57.916125 env[1726]: 2025-09-13 00:47:57.868 [INFO][4467] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.43.64/26 handle="k8s-pod-network.c1c488c5db2d36aa6721803e4822b9c4777c4a78b7bb4679bbe3fe82d2a5b7f6" host="ip-172-31-26-227" Sep 13 00:47:57.916125 env[1726]: 2025-09-13 00:47:57.869 [INFO][4467] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.c1c488c5db2d36aa6721803e4822b9c4777c4a78b7bb4679bbe3fe82d2a5b7f6 Sep 13 00:47:57.916125 env[1726]: 2025-09-13 00:47:57.875 [INFO][4467] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.43.64/26 handle="k8s-pod-network.c1c488c5db2d36aa6721803e4822b9c4777c4a78b7bb4679bbe3fe82d2a5b7f6" host="ip-172-31-26-227" Sep 13 00:47:57.916125 env[1726]: 2025-09-13 00:47:57.883 [INFO][4467] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.43.66/26] block=192.168.43.64/26 handle="k8s-pod-network.c1c488c5db2d36aa6721803e4822b9c4777c4a78b7bb4679bbe3fe82d2a5b7f6" host="ip-172-31-26-227" Sep 13 00:47:57.916125 env[1726]: 2025-09-13 00:47:57.883 [INFO][4467] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.43.66/26] handle="k8s-pod-network.c1c488c5db2d36aa6721803e4822b9c4777c4a78b7bb4679bbe3fe82d2a5b7f6" host="ip-172-31-26-227" Sep 13 00:47:57.916125 env[1726]: 2025-09-13 00:47:57.883 [INFO][4467] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:47:57.916125 env[1726]: 2025-09-13 00:47:57.883 [INFO][4467] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.43.66/26] IPv6=[] ContainerID="c1c488c5db2d36aa6721803e4822b9c4777c4a78b7bb4679bbe3fe82d2a5b7f6" HandleID="k8s-pod-network.c1c488c5db2d36aa6721803e4822b9c4777c4a78b7bb4679bbe3fe82d2a5b7f6" Workload="ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--m8hcv-eth0" Sep 13 00:47:57.916830 env[1726]: 2025-09-13 00:47:57.887 [INFO][4444] cni-plugin/k8s.go 418: Populated endpoint ContainerID="c1c488c5db2d36aa6721803e4822b9c4777c4a78b7bb4679bbe3fe82d2a5b7f6" Namespace="calico-apiserver" Pod="calico-apiserver-75d655b7b-m8hcv" WorkloadEndpoint="ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--m8hcv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--m8hcv-eth0", GenerateName:"calico-apiserver-75d655b7b-", Namespace:"calico-apiserver", SelfLink:"", UID:"e8d89abb-6036-40eb-8686-f59fb32e8978", ResourceVersion:"942", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 47, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75d655b7b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-227", ContainerID:"", Pod:"calico-apiserver-75d655b7b-m8hcv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.43.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2543d660658", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:47:57.916830 env[1726]: 2025-09-13 00:47:57.887 [INFO][4444] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.43.66/32] ContainerID="c1c488c5db2d36aa6721803e4822b9c4777c4a78b7bb4679bbe3fe82d2a5b7f6" Namespace="calico-apiserver" Pod="calico-apiserver-75d655b7b-m8hcv" WorkloadEndpoint="ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--m8hcv-eth0" Sep 13 00:47:57.916830 env[1726]: 2025-09-13 00:47:57.887 [INFO][4444] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2543d660658 ContainerID="c1c488c5db2d36aa6721803e4822b9c4777c4a78b7bb4679bbe3fe82d2a5b7f6" Namespace="calico-apiserver" Pod="calico-apiserver-75d655b7b-m8hcv" WorkloadEndpoint="ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--m8hcv-eth0" Sep 13 00:47:57.916830 env[1726]: 2025-09-13 00:47:57.899 [INFO][4444] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c1c488c5db2d36aa6721803e4822b9c4777c4a78b7bb4679bbe3fe82d2a5b7f6" Namespace="calico-apiserver" Pod="calico-apiserver-75d655b7b-m8hcv" WorkloadEndpoint="ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--m8hcv-eth0" Sep 13 00:47:57.916830 env[1726]: 2025-09-13 00:47:57.899 [INFO][4444] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="c1c488c5db2d36aa6721803e4822b9c4777c4a78b7bb4679bbe3fe82d2a5b7f6" Namespace="calico-apiserver" Pod="calico-apiserver-75d655b7b-m8hcv" WorkloadEndpoint="ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--m8hcv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--m8hcv-eth0", GenerateName:"calico-apiserver-75d655b7b-", Namespace:"calico-apiserver", SelfLink:"", UID:"e8d89abb-6036-40eb-8686-f59fb32e8978", ResourceVersion:"942", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 47, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75d655b7b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-227", ContainerID:"c1c488c5db2d36aa6721803e4822b9c4777c4a78b7bb4679bbe3fe82d2a5b7f6", Pod:"calico-apiserver-75d655b7b-m8hcv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.43.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2543d660658", MAC:"7a:e3:ff:a2:a4:2d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:47:57.916830 env[1726]: 2025-09-13 00:47:57.912 [INFO][4444] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="c1c488c5db2d36aa6721803e4822b9c4777c4a78b7bb4679bbe3fe82d2a5b7f6" Namespace="calico-apiserver" Pod="calico-apiserver-75d655b7b-m8hcv" WorkloadEndpoint="ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--m8hcv-eth0" Sep 13 00:47:57.945847 env[1726]: time="2025-09-13T00:47:57.945760452Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:47:57.946157 env[1726]: time="2025-09-13T00:47:57.946095705Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:47:57.946302 env[1726]: time="2025-09-13T00:47:57.946276940Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:47:57.947868 env[1726]: time="2025-09-13T00:47:57.947793422Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c1c488c5db2d36aa6721803e4822b9c4777c4a78b7bb4679bbe3fe82d2a5b7f6 pid=4498 runtime=io.containerd.runc.v2 Sep 13 00:47:57.950000 audit[4497]: NETFILTER_CFG table=filter:106 family=2 entries=50 op=nft_register_chain pid=4497 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:47:57.950000 audit[4497]: SYSCALL arch=c000003e syscall=46 success=yes exit=28208 a0=3 a1=7ffd169f8f70 a2=0 a3=7ffd169f8f5c items=0 ppid=4141 pid=4497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:57.950000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:47:57.973666 systemd[1]: Started cri-containerd-c1c488c5db2d36aa6721803e4822b9c4777c4a78b7bb4679bbe3fe82d2a5b7f6.scope. Sep 13 00:47:58.007519 systemd-networkd[1456]: calicc39b679a9d: Gained IPv6LL Sep 13 00:47:58.020566 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid7d7ed5354e: link becomes ready Sep 13 00:47:58.020928 systemd-networkd[1456]: calid7d7ed5354e: Link UP Sep 13 00:47:58.021235 systemd-networkd[1456]: calid7d7ed5354e: Gained carrier Sep 13 00:47:58.053866 env[1726]: 2025-09-13 00:47:57.799 [INFO][4454] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--26--227-k8s-calico--kube--controllers--c859df7bc--8p7k4-eth0 calico-kube-controllers-c859df7bc- calico-system 16d0b1a9-37f6-4d2e-b8a8-ba59e19f0516 943 0 2025-09-13 00:47:34 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:c859df7bc projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ip-172-31-26-227 calico-kube-controllers-c859df7bc-8p7k4 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calid7d7ed5354e [] [] }} ContainerID="910e1bf6374a998605fa05598fc25a3be12d6d238b1aea8e462788a19e87bd12" Namespace="calico-system" Pod="calico-kube-controllers-c859df7bc-8p7k4" WorkloadEndpoint="ip--172--31--26--227-k8s-calico--kube--controllers--c859df7bc--8p7k4-" Sep 13 00:47:58.053866 env[1726]: 2025-09-13 00:47:57.799 [INFO][4454] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="910e1bf6374a998605fa05598fc25a3be12d6d238b1aea8e462788a19e87bd12" Namespace="calico-system" Pod="calico-kube-controllers-c859df7bc-8p7k4" WorkloadEndpoint="ip--172--31--26--227-k8s-calico--kube--controllers--c859df7bc--8p7k4-eth0" Sep 13 00:47:58.053866 env[1726]: 2025-09-13 00:47:57.852 [INFO][4475] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="910e1bf6374a998605fa05598fc25a3be12d6d238b1aea8e462788a19e87bd12" HandleID="k8s-pod-network.910e1bf6374a998605fa05598fc25a3be12d6d238b1aea8e462788a19e87bd12" Workload="ip--172--31--26--227-k8s-calico--kube--controllers--c859df7bc--8p7k4-eth0" Sep 13 00:47:58.053866 env[1726]: 2025-09-13 00:47:57.852 [INFO][4475] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="910e1bf6374a998605fa05598fc25a3be12d6d238b1aea8e462788a19e87bd12" HandleID="k8s-pod-network.910e1bf6374a998605fa05598fc25a3be12d6d238b1aea8e462788a19e87bd12" Workload="ip--172--31--26--227-k8s-calico--kube--controllers--c859df7bc--8p7k4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00025b230), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-26-227", "pod":"calico-kube-controllers-c859df7bc-8p7k4", "timestamp":"2025-09-13 00:47:57.852157276 +0000 UTC"}, Hostname:"ip-172-31-26-227", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:47:58.053866 env[1726]: 2025-09-13 00:47:57.852 [INFO][4475] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:47:58.053866 env[1726]: 2025-09-13 00:47:57.883 [INFO][4475] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:47:58.053866 env[1726]: 2025-09-13 00:47:57.884 [INFO][4475] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-26-227' Sep 13 00:47:58.053866 env[1726]: 2025-09-13 00:47:57.951 [INFO][4475] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.910e1bf6374a998605fa05598fc25a3be12d6d238b1aea8e462788a19e87bd12" host="ip-172-31-26-227" Sep 13 00:47:58.053866 env[1726]: 2025-09-13 00:47:57.958 [INFO][4475] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-26-227" Sep 13 00:47:58.053866 env[1726]: 2025-09-13 00:47:57.965 [INFO][4475] ipam/ipam.go 511: Trying affinity for 192.168.43.64/26 host="ip-172-31-26-227" Sep 13 00:47:58.053866 env[1726]: 2025-09-13 00:47:57.968 [INFO][4475] ipam/ipam.go 158: Attempting to load block cidr=192.168.43.64/26 host="ip-172-31-26-227" Sep 13 00:47:58.053866 env[1726]: 2025-09-13 00:47:57.971 [INFO][4475] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.43.64/26 host="ip-172-31-26-227" Sep 13 00:47:58.053866 env[1726]: 2025-09-13 00:47:57.972 [INFO][4475] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.43.64/26 handle="k8s-pod-network.910e1bf6374a998605fa05598fc25a3be12d6d238b1aea8e462788a19e87bd12" host="ip-172-31-26-227" Sep 13 00:47:58.053866 env[1726]: 2025-09-13 00:47:57.976 [INFO][4475] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.910e1bf6374a998605fa05598fc25a3be12d6d238b1aea8e462788a19e87bd12 Sep 13 00:47:58.053866 env[1726]: 2025-09-13 00:47:57.988 [INFO][4475] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.43.64/26 handle="k8s-pod-network.910e1bf6374a998605fa05598fc25a3be12d6d238b1aea8e462788a19e87bd12" host="ip-172-31-26-227" Sep 13 00:47:58.053866 env[1726]: 2025-09-13 00:47:57.998 [INFO][4475] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.43.67/26] block=192.168.43.64/26 handle="k8s-pod-network.910e1bf6374a998605fa05598fc25a3be12d6d238b1aea8e462788a19e87bd12" host="ip-172-31-26-227" Sep 13 00:47:58.053866 env[1726]: 2025-09-13 00:47:57.998 [INFO][4475] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.43.67/26] handle="k8s-pod-network.910e1bf6374a998605fa05598fc25a3be12d6d238b1aea8e462788a19e87bd12" host="ip-172-31-26-227" Sep 13 00:47:58.053866 env[1726]: 2025-09-13 00:47:57.998 [INFO][4475] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:47:58.053866 env[1726]: 2025-09-13 00:47:57.998 [INFO][4475] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.43.67/26] IPv6=[] ContainerID="910e1bf6374a998605fa05598fc25a3be12d6d238b1aea8e462788a19e87bd12" HandleID="k8s-pod-network.910e1bf6374a998605fa05598fc25a3be12d6d238b1aea8e462788a19e87bd12" Workload="ip--172--31--26--227-k8s-calico--kube--controllers--c859df7bc--8p7k4-eth0" Sep 13 00:47:58.055136 env[1726]: 2025-09-13 00:47:58.014 [INFO][4454] cni-plugin/k8s.go 418: Populated endpoint ContainerID="910e1bf6374a998605fa05598fc25a3be12d6d238b1aea8e462788a19e87bd12" Namespace="calico-system" Pod="calico-kube-controllers-c859df7bc-8p7k4" WorkloadEndpoint="ip--172--31--26--227-k8s-calico--kube--controllers--c859df7bc--8p7k4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--227-k8s-calico--kube--controllers--c859df7bc--8p7k4-eth0", GenerateName:"calico-kube-controllers-c859df7bc-", Namespace:"calico-system", SelfLink:"", UID:"16d0b1a9-37f6-4d2e-b8a8-ba59e19f0516", ResourceVersion:"943", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 47, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"c859df7bc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-227", ContainerID:"", Pod:"calico-kube-controllers-c859df7bc-8p7k4", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.43.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid7d7ed5354e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:47:58.055136 env[1726]: 2025-09-13 00:47:58.015 [INFO][4454] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.43.67/32] ContainerID="910e1bf6374a998605fa05598fc25a3be12d6d238b1aea8e462788a19e87bd12" Namespace="calico-system" Pod="calico-kube-controllers-c859df7bc-8p7k4" WorkloadEndpoint="ip--172--31--26--227-k8s-calico--kube--controllers--c859df7bc--8p7k4-eth0" Sep 13 00:47:58.055136 env[1726]: 2025-09-13 00:47:58.015 [INFO][4454] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid7d7ed5354e ContainerID="910e1bf6374a998605fa05598fc25a3be12d6d238b1aea8e462788a19e87bd12" Namespace="calico-system" Pod="calico-kube-controllers-c859df7bc-8p7k4" WorkloadEndpoint="ip--172--31--26--227-k8s-calico--kube--controllers--c859df7bc--8p7k4-eth0" Sep 13 00:47:58.055136 env[1726]: 2025-09-13 00:47:58.020 [INFO][4454] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="910e1bf6374a998605fa05598fc25a3be12d6d238b1aea8e462788a19e87bd12" Namespace="calico-system" Pod="calico-kube-controllers-c859df7bc-8p7k4" WorkloadEndpoint="ip--172--31--26--227-k8s-calico--kube--controllers--c859df7bc--8p7k4-eth0" Sep 13 00:47:58.055136 env[1726]: 2025-09-13 00:47:58.022 [INFO][4454] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="910e1bf6374a998605fa05598fc25a3be12d6d238b1aea8e462788a19e87bd12" Namespace="calico-system" Pod="calico-kube-controllers-c859df7bc-8p7k4" WorkloadEndpoint="ip--172--31--26--227-k8s-calico--kube--controllers--c859df7bc--8p7k4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--227-k8s-calico--kube--controllers--c859df7bc--8p7k4-eth0", GenerateName:"calico-kube-controllers-c859df7bc-", Namespace:"calico-system", SelfLink:"", UID:"16d0b1a9-37f6-4d2e-b8a8-ba59e19f0516", ResourceVersion:"943", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 47, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"c859df7bc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-227", ContainerID:"910e1bf6374a998605fa05598fc25a3be12d6d238b1aea8e462788a19e87bd12", Pod:"calico-kube-controllers-c859df7bc-8p7k4", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.43.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid7d7ed5354e", MAC:"0a:77:a2:fe:af:55", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:47:58.055136 env[1726]: 2025-09-13 00:47:58.044 [INFO][4454] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="910e1bf6374a998605fa05598fc25a3be12d6d238b1aea8e462788a19e87bd12" Namespace="calico-system" Pod="calico-kube-controllers-c859df7bc-8p7k4" WorkloadEndpoint="ip--172--31--26--227-k8s-calico--kube--controllers--c859df7bc--8p7k4-eth0" Sep 13 00:47:58.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.079000 audit: BPF prog-id=172 op=LOAD Sep 13 00:47:58.081000 audit[4510]: AVC avc: denied { bpf } for pid=4510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.081000 audit[4510]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4498 pid=4510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:58.081000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331633438386335646232643336616136373231383033653438323262 Sep 13 00:47:58.081000 audit[4510]: AVC avc: denied { perfmon } for pid=4510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.081000 audit[4510]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4498 pid=4510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:58.081000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331633438386335646232643336616136373231383033653438323262 Sep 13 00:47:58.081000 audit[4510]: AVC avc: denied { bpf } for pid=4510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.081000 audit[4510]: AVC avc: denied { bpf } for pid=4510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.081000 audit[4510]: AVC avc: denied { bpf } for pid=4510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.081000 audit[4510]: AVC avc: denied { perfmon } for pid=4510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.081000 audit[4510]: AVC avc: denied { perfmon } for pid=4510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.081000 audit[4510]: AVC avc: denied { perfmon } for pid=4510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.081000 audit[4510]: AVC avc: denied { perfmon } for pid=4510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.081000 audit[4510]: AVC avc: denied { perfmon } for pid=4510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.081000 audit[4510]: AVC avc: denied { bpf } for pid=4510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.081000 audit[4510]: AVC avc: denied { bpf } for pid=4510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.081000 audit: BPF prog-id=173 op=LOAD Sep 13 00:47:58.081000 audit[4510]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002c9ce0 items=0 ppid=4498 pid=4510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:58.081000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331633438386335646232643336616136373231383033653438323262 Sep 13 00:47:58.083000 audit[4510]: AVC avc: denied { bpf } for pid=4510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.083000 audit[4510]: AVC avc: denied { bpf } for pid=4510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.083000 audit[4510]: AVC avc: denied { perfmon } for pid=4510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.083000 audit[4510]: AVC avc: denied { perfmon } for pid=4510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.083000 audit[4510]: AVC avc: denied { perfmon } for pid=4510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.083000 audit[4510]: AVC avc: denied { perfmon } for pid=4510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.083000 audit[4510]: AVC avc: denied { perfmon } for pid=4510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.083000 audit[4510]: AVC avc: denied { bpf } for pid=4510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.083000 audit[4510]: AVC avc: denied { bpf } for pid=4510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.083000 audit: BPF prog-id=174 op=LOAD Sep 13 00:47:58.083000 audit[4510]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002c9d28 items=0 ppid=4498 pid=4510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:58.083000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331633438386335646232643336616136373231383033653438323262 Sep 13 00:47:58.084000 audit: BPF prog-id=174 op=UNLOAD Sep 13 00:47:58.084000 audit: BPF prog-id=173 op=UNLOAD Sep 13 00:47:58.084000 audit[4510]: AVC avc: denied { bpf } for pid=4510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.084000 audit[4510]: AVC avc: denied { bpf } for pid=4510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.084000 audit[4510]: AVC avc: denied { bpf } for pid=4510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.084000 audit[4510]: AVC avc: denied { perfmon } for pid=4510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.084000 audit[4510]: AVC avc: denied { perfmon } for pid=4510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.084000 audit[4510]: AVC avc: denied { perfmon } for pid=4510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.084000 audit[4510]: AVC avc: denied { perfmon } for pid=4510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.084000 audit[4510]: AVC avc: denied { perfmon } for pid=4510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.084000 audit[4510]: AVC avc: denied { bpf } for pid=4510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.084000 audit[4510]: AVC avc: denied { bpf } for pid=4510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.084000 audit: BPF prog-id=175 op=LOAD Sep 13 00:47:58.084000 audit[4510]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00034e138 items=0 ppid=4498 pid=4510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:58.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331633438386335646232643336616136373231383033653438323262 Sep 13 00:47:58.096000 audit[4537]: NETFILTER_CFG table=filter:107 family=2 entries=40 op=nft_register_chain pid=4537 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:47:58.096000 audit[4537]: SYSCALL arch=c000003e syscall=46 success=yes exit=20764 a0=3 a1=7fffc566f240 a2=0 a3=7fffc566f22c items=0 ppid=4141 pid=4537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:58.096000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:47:58.100765 env[1726]: time="2025-09-13T00:47:58.099814391Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:47:58.100765 env[1726]: time="2025-09-13T00:47:58.099873973Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:47:58.100765 env[1726]: time="2025-09-13T00:47:58.099888777Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:47:58.100765 env[1726]: time="2025-09-13T00:47:58.100115489Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/910e1bf6374a998605fa05598fc25a3be12d6d238b1aea8e462788a19e87bd12 pid=4541 runtime=io.containerd.runc.v2 Sep 13 00:47:58.148855 systemd[1]: Started cri-containerd-910e1bf6374a998605fa05598fc25a3be12d6d238b1aea8e462788a19e87bd12.scope. Sep 13 00:47:58.193742 env[1726]: time="2025-09-13T00:47:58.193694152Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75d655b7b-m8hcv,Uid:e8d89abb-6036-40eb-8686-f59fb32e8978,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"c1c488c5db2d36aa6721803e4822b9c4777c4a78b7bb4679bbe3fe82d2a5b7f6\"" Sep 13 00:47:58.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.236000 audit: BPF prog-id=176 op=LOAD Sep 13 00:47:58.236000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.236000 audit[4552]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4541 pid=4552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:58.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931306531626636333734613939383630356661303535393866633235 Sep 13 00:47:58.236000 audit[4552]: AVC avc: denied { perfmon } for pid=4552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.236000 audit[4552]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4541 pid=4552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:58.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931306531626636333734613939383630356661303535393866633235 Sep 13 00:47:58.236000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.236000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.236000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.236000 audit[4552]: AVC avc: denied { perfmon } for pid=4552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.236000 audit[4552]: AVC avc: denied { perfmon } for pid=4552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.236000 audit[4552]: AVC avc: denied { perfmon } for pid=4552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.236000 audit[4552]: AVC avc: denied { perfmon } for pid=4552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.236000 audit[4552]: AVC avc: denied { perfmon } for pid=4552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.236000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.236000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.236000 audit: BPF prog-id=177 op=LOAD Sep 13 00:47:58.236000 audit[4552]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000388350 items=0 ppid=4541 pid=4552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:58.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931306531626636333734613939383630356661303535393866633235 Sep 13 00:47:58.237000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.237000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.237000 audit[4552]: AVC avc: denied { perfmon } for pid=4552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.237000 audit[4552]: AVC avc: denied { perfmon } for pid=4552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.237000 audit[4552]: AVC avc: denied { perfmon } for pid=4552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.237000 audit[4552]: AVC avc: denied { perfmon } for pid=4552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.237000 audit[4552]: AVC avc: denied { perfmon } for pid=4552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.237000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.237000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.237000 audit: BPF prog-id=178 op=LOAD Sep 13 00:47:58.237000 audit[4552]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000388398 items=0 ppid=4541 pid=4552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:58.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931306531626636333734613939383630356661303535393866633235 Sep 13 00:47:58.237000 audit: BPF prog-id=178 op=UNLOAD Sep 13 00:47:58.237000 audit: BPF prog-id=177 op=UNLOAD Sep 13 00:47:58.237000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.237000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.237000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.237000 audit[4552]: AVC avc: denied { perfmon } for pid=4552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.237000 audit[4552]: AVC avc: denied { perfmon } for pid=4552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.237000 audit[4552]: AVC avc: denied { perfmon } for pid=4552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.237000 audit[4552]: AVC avc: denied { perfmon } for pid=4552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.237000 audit[4552]: AVC avc: denied { perfmon } for pid=4552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.237000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.237000 audit[4552]: AVC avc: denied { bpf } for pid=4552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.237000 audit: BPF prog-id=179 op=LOAD Sep 13 00:47:58.237000 audit[4552]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003887a8 items=0 ppid=4541 pid=4552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:58.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931306531626636333734613939383630356661303535393866633235 Sep 13 00:47:58.284235 env[1726]: time="2025-09-13T00:47:58.284183936Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-c859df7bc-8p7k4,Uid:16d0b1a9-37f6-4d2e-b8a8-ba59e19f0516,Namespace:calico-system,Attempt:1,} returns sandbox id \"910e1bf6374a998605fa05598fc25a3be12d6d238b1aea8e462788a19e87bd12\"" Sep 13 00:47:58.352027 env[1726]: time="2025-09-13T00:47:58.351979216Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:58.355992 env[1726]: time="2025-09-13T00:47:58.355952583Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9a4eedeed4a531acefb7f5d0a1b7e3856b1a9a24d9e7d25deef2134d7a734c2d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:58.358703 env[1726]: time="2025-09-13T00:47:58.358667457Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/whisker:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:58.361467 env[1726]: time="2025-09-13T00:47:58.361422565Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker@sha256:e7113761fc7633d515882f0d48b5c8d0b8e62f3f9d34823f2ee194bb16d2ec44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:47:58.362072 env[1726]: time="2025-09-13T00:47:58.362020173Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.3\" returns image reference \"sha256:9a4eedeed4a531acefb7f5d0a1b7e3856b1a9a24d9e7d25deef2134d7a734c2d\"" Sep 13 00:47:58.363783 env[1726]: time="2025-09-13T00:47:58.363758396Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.3\"" Sep 13 00:47:58.366020 env[1726]: time="2025-09-13T00:47:58.365987312Z" level=info msg="CreateContainer within sandbox \"822724b1f27c183483b6c3b0a5ea01d2376c70f5f08c9f37b6cf4972fb8d0d6b\" for container &ContainerMetadata{Name:whisker,Attempt:0,}" Sep 13 00:47:58.394573 env[1726]: time="2025-09-13T00:47:58.394067959Z" level=info msg="CreateContainer within sandbox \"822724b1f27c183483b6c3b0a5ea01d2376c70f5f08c9f37b6cf4972fb8d0d6b\" for &ContainerMetadata{Name:whisker,Attempt:0,} returns container id \"201755594290ad222ee36ffae21e93578d7fceec886fa523109b940a73b95a23\"" Sep 13 00:47:58.397017 env[1726]: time="2025-09-13T00:47:58.396986588Z" level=info msg="StartContainer for \"201755594290ad222ee36ffae21e93578d7fceec886fa523109b940a73b95a23\"" Sep 13 00:47:58.428256 systemd[1]: run-containerd-runc-k8s.io-201755594290ad222ee36ffae21e93578d7fceec886fa523109b940a73b95a23-runc.VPXki5.mount: Deactivated successfully. Sep 13 00:47:58.434342 systemd[1]: Started cri-containerd-201755594290ad222ee36ffae21e93578d7fceec886fa523109b940a73b95a23.scope. Sep 13 00:47:58.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.446000 audit: BPF prog-id=180 op=LOAD Sep 13 00:47:58.447000 audit[4588]: AVC avc: denied { bpf } for pid=4588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.447000 audit[4588]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4358 pid=4588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:58.447000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230313735353539343239306164323232656533366666616532316539 Sep 13 00:47:58.447000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.447000 audit[4588]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4358 pid=4588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:58.447000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230313735353539343239306164323232656533366666616532316539 Sep 13 00:47:58.447000 audit[4588]: AVC avc: denied { bpf } for pid=4588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.447000 audit[4588]: AVC avc: denied { bpf } for pid=4588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.447000 audit[4588]: AVC avc: denied { bpf } for pid=4588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.447000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.447000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.447000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.447000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.447000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.447000 audit[4588]: AVC avc: denied { bpf } for pid=4588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.447000 audit[4588]: AVC avc: denied { bpf } for pid=4588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.447000 audit: BPF prog-id=181 op=LOAD Sep 13 00:47:58.447000 audit[4588]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003c54a0 items=0 ppid=4358 pid=4588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:58.447000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230313735353539343239306164323232656533366666616532316539 Sep 13 00:47:58.447000 audit[4588]: AVC avc: denied { bpf } for pid=4588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.447000 audit[4588]: AVC avc: denied { bpf } for pid=4588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.447000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.447000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.447000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.447000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.447000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.447000 audit[4588]: AVC avc: denied { bpf } for pid=4588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.447000 audit[4588]: AVC avc: denied { bpf } for pid=4588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.447000 audit: BPF prog-id=182 op=LOAD Sep 13 00:47:58.447000 audit[4588]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003c54e8 items=0 ppid=4358 pid=4588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:58.447000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230313735353539343239306164323232656533366666616532316539 Sep 13 00:47:58.447000 audit: BPF prog-id=182 op=UNLOAD Sep 13 00:47:58.447000 audit: BPF prog-id=181 op=UNLOAD Sep 13 00:47:58.447000 audit[4588]: AVC avc: denied { bpf } for pid=4588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.447000 audit[4588]: AVC avc: denied { bpf } for pid=4588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.447000 audit[4588]: AVC avc: denied { bpf } for pid=4588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.447000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.447000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.447000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.447000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.447000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.447000 audit[4588]: AVC avc: denied { bpf } for pid=4588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.447000 audit[4588]: AVC avc: denied { bpf } for pid=4588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:58.447000 audit: BPF prog-id=183 op=LOAD Sep 13 00:47:58.447000 audit[4588]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003c58f8 items=0 ppid=4358 pid=4588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:58.447000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230313735353539343239306164323232656533366666616532316539 Sep 13 00:47:58.486361 env[1726]: time="2025-09-13T00:47:58.486284070Z" level=info msg="StartContainer for \"201755594290ad222ee36ffae21e93578d7fceec886fa523109b940a73b95a23\" returns successfully" Sep 13 00:47:58.519000 audit[4599]: AVC avc: denied { search } for pid=4599 comm="nginx" name="crypto" dev="proc" ino=27682 scontext=system_u:system_r:svirt_lxc_net_t:s0:c367,c825 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 13 00:47:58.519000 audit[4599]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f9eb2c57728 a2=0 a3=0 items=0 ppid=4358 pid=4599 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="nginx" exe="/usr/sbin/nginx" subj=system_u:system_r:svirt_lxc_net_t:s0:c367,c825 key=(null) Sep 13 00:47:58.519000 audit: PROCTITLE proctitle=2F7573722F7362696E2F6E67696E78002D67006461656D6F6E206F66663B Sep 13 00:47:59.492836 env[1726]: time="2025-09-13T00:47:59.492799300Z" level=info msg="StopPodSandbox for \"7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d\"" Sep 13 00:47:59.621160 env[1726]: 2025-09-13 00:47:59.561 [INFO][4626] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d" Sep 13 00:47:59.621160 env[1726]: 2025-09-13 00:47:59.562 [INFO][4626] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d" iface="eth0" netns="/var/run/netns/cni-6296b569-8eb7-add9-e7d6-4d7980b60c6d" Sep 13 00:47:59.621160 env[1726]: 2025-09-13 00:47:59.562 [INFO][4626] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d" iface="eth0" netns="/var/run/netns/cni-6296b569-8eb7-add9-e7d6-4d7980b60c6d" Sep 13 00:47:59.621160 env[1726]: 2025-09-13 00:47:59.562 [INFO][4626] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d" iface="eth0" netns="/var/run/netns/cni-6296b569-8eb7-add9-e7d6-4d7980b60c6d" Sep 13 00:47:59.621160 env[1726]: 2025-09-13 00:47:59.562 [INFO][4626] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d" Sep 13 00:47:59.621160 env[1726]: 2025-09-13 00:47:59.562 [INFO][4626] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d" Sep 13 00:47:59.621160 env[1726]: 2025-09-13 00:47:59.597 [INFO][4634] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d" HandleID="k8s-pod-network.7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d" Workload="ip--172--31--26--227-k8s-coredns--668d6bf9bc--j248j-eth0" Sep 13 00:47:59.621160 env[1726]: 2025-09-13 00:47:59.598 [INFO][4634] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:47:59.621160 env[1726]: 2025-09-13 00:47:59.598 [INFO][4634] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:47:59.621160 env[1726]: 2025-09-13 00:47:59.613 [WARNING][4634] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d" HandleID="k8s-pod-network.7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d" Workload="ip--172--31--26--227-k8s-coredns--668d6bf9bc--j248j-eth0" Sep 13 00:47:59.621160 env[1726]: 2025-09-13 00:47:59.613 [INFO][4634] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d" HandleID="k8s-pod-network.7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d" Workload="ip--172--31--26--227-k8s-coredns--668d6bf9bc--j248j-eth0" Sep 13 00:47:59.621160 env[1726]: 2025-09-13 00:47:59.615 [INFO][4634] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:47:59.621160 env[1726]: 2025-09-13 00:47:59.618 [INFO][4626] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d" Sep 13 00:47:59.626197 env[1726]: time="2025-09-13T00:47:59.625963775Z" level=info msg="TearDown network for sandbox \"7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d\" successfully" Sep 13 00:47:59.626197 env[1726]: time="2025-09-13T00:47:59.625998397Z" level=info msg="StopPodSandbox for \"7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d\" returns successfully" Sep 13 00:47:59.624716 systemd[1]: run-netns-cni\x2d6296b569\x2d8eb7\x2dadd9\x2de7d6\x2d4d7980b60c6d.mount: Deactivated successfully. Sep 13 00:47:59.626769 env[1726]: time="2025-09-13T00:47:59.626723541Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-j248j,Uid:25e06c1f-1251-4571-ab79-6a6602efc42f,Namespace:kube-system,Attempt:1,}" Sep 13 00:47:59.834020 systemd-networkd[1456]: cali80b4eaf1821: Link UP Sep 13 00:47:59.839720 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:47:59.840951 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali80b4eaf1821: link becomes ready Sep 13 00:47:59.840158 systemd-networkd[1456]: cali80b4eaf1821: Gained carrier Sep 13 00:47:59.867868 env[1726]: 2025-09-13 00:47:59.712 [INFO][4641] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--26--227-k8s-coredns--668d6bf9bc--j248j-eth0 coredns-668d6bf9bc- kube-system 25e06c1f-1251-4571-ab79-6a6602efc42f 960 0 2025-09-13 00:47:17 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-26-227 coredns-668d6bf9bc-j248j eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali80b4eaf1821 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="c0105be3f439e6074e268de539114ab91ce501fe866dc87c91a24b3d2f5c21e7" Namespace="kube-system" Pod="coredns-668d6bf9bc-j248j" WorkloadEndpoint="ip--172--31--26--227-k8s-coredns--668d6bf9bc--j248j-" Sep 13 00:47:59.867868 env[1726]: 2025-09-13 00:47:59.713 [INFO][4641] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="c0105be3f439e6074e268de539114ab91ce501fe866dc87c91a24b3d2f5c21e7" Namespace="kube-system" Pod="coredns-668d6bf9bc-j248j" WorkloadEndpoint="ip--172--31--26--227-k8s-coredns--668d6bf9bc--j248j-eth0" Sep 13 00:47:59.867868 env[1726]: 2025-09-13 00:47:59.761 [INFO][4653] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c0105be3f439e6074e268de539114ab91ce501fe866dc87c91a24b3d2f5c21e7" HandleID="k8s-pod-network.c0105be3f439e6074e268de539114ab91ce501fe866dc87c91a24b3d2f5c21e7" Workload="ip--172--31--26--227-k8s-coredns--668d6bf9bc--j248j-eth0" Sep 13 00:47:59.867868 env[1726]: 2025-09-13 00:47:59.761 [INFO][4653] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c0105be3f439e6074e268de539114ab91ce501fe866dc87c91a24b3d2f5c21e7" HandleID="k8s-pod-network.c0105be3f439e6074e268de539114ab91ce501fe866dc87c91a24b3d2f5c21e7" Workload="ip--172--31--26--227-k8s-coredns--668d6bf9bc--j248j-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d5600), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-26-227", "pod":"coredns-668d6bf9bc-j248j", "timestamp":"2025-09-13 00:47:59.761385293 +0000 UTC"}, Hostname:"ip-172-31-26-227", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:47:59.867868 env[1726]: 2025-09-13 00:47:59.762 [INFO][4653] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:47:59.867868 env[1726]: 2025-09-13 00:47:59.762 [INFO][4653] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:47:59.867868 env[1726]: 2025-09-13 00:47:59.762 [INFO][4653] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-26-227' Sep 13 00:47:59.867868 env[1726]: 2025-09-13 00:47:59.770 [INFO][4653] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.c0105be3f439e6074e268de539114ab91ce501fe866dc87c91a24b3d2f5c21e7" host="ip-172-31-26-227" Sep 13 00:47:59.867868 env[1726]: 2025-09-13 00:47:59.778 [INFO][4653] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-26-227" Sep 13 00:47:59.867868 env[1726]: 2025-09-13 00:47:59.783 [INFO][4653] ipam/ipam.go 511: Trying affinity for 192.168.43.64/26 host="ip-172-31-26-227" Sep 13 00:47:59.867868 env[1726]: 2025-09-13 00:47:59.785 [INFO][4653] ipam/ipam.go 158: Attempting to load block cidr=192.168.43.64/26 host="ip-172-31-26-227" Sep 13 00:47:59.867868 env[1726]: 2025-09-13 00:47:59.796 [INFO][4653] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.43.64/26 host="ip-172-31-26-227" Sep 13 00:47:59.867868 env[1726]: 2025-09-13 00:47:59.796 [INFO][4653] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.43.64/26 handle="k8s-pod-network.c0105be3f439e6074e268de539114ab91ce501fe866dc87c91a24b3d2f5c21e7" host="ip-172-31-26-227" Sep 13 00:47:59.867868 env[1726]: 2025-09-13 00:47:59.798 [INFO][4653] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.c0105be3f439e6074e268de539114ab91ce501fe866dc87c91a24b3d2f5c21e7 Sep 13 00:47:59.867868 env[1726]: 2025-09-13 00:47:59.804 [INFO][4653] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.43.64/26 handle="k8s-pod-network.c0105be3f439e6074e268de539114ab91ce501fe866dc87c91a24b3d2f5c21e7" host="ip-172-31-26-227" Sep 13 00:47:59.867868 env[1726]: 2025-09-13 00:47:59.814 [INFO][4653] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.43.68/26] block=192.168.43.64/26 handle="k8s-pod-network.c0105be3f439e6074e268de539114ab91ce501fe866dc87c91a24b3d2f5c21e7" host="ip-172-31-26-227" Sep 13 00:47:59.867868 env[1726]: 2025-09-13 00:47:59.814 [INFO][4653] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.43.68/26] handle="k8s-pod-network.c0105be3f439e6074e268de539114ab91ce501fe866dc87c91a24b3d2f5c21e7" host="ip-172-31-26-227" Sep 13 00:47:59.867868 env[1726]: 2025-09-13 00:47:59.814 [INFO][4653] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:47:59.867868 env[1726]: 2025-09-13 00:47:59.814 [INFO][4653] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.43.68/26] IPv6=[] ContainerID="c0105be3f439e6074e268de539114ab91ce501fe866dc87c91a24b3d2f5c21e7" HandleID="k8s-pod-network.c0105be3f439e6074e268de539114ab91ce501fe866dc87c91a24b3d2f5c21e7" Workload="ip--172--31--26--227-k8s-coredns--668d6bf9bc--j248j-eth0" Sep 13 00:47:59.869001 env[1726]: 2025-09-13 00:47:59.817 [INFO][4641] cni-plugin/k8s.go 418: Populated endpoint ContainerID="c0105be3f439e6074e268de539114ab91ce501fe866dc87c91a24b3d2f5c21e7" Namespace="kube-system" Pod="coredns-668d6bf9bc-j248j" WorkloadEndpoint="ip--172--31--26--227-k8s-coredns--668d6bf9bc--j248j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--227-k8s-coredns--668d6bf9bc--j248j-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"25e06c1f-1251-4571-ab79-6a6602efc42f", ResourceVersion:"960", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 47, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-227", ContainerID:"", Pod:"coredns-668d6bf9bc-j248j", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.43.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali80b4eaf1821", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:47:59.869001 env[1726]: 2025-09-13 00:47:59.818 [INFO][4641] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.43.68/32] ContainerID="c0105be3f439e6074e268de539114ab91ce501fe866dc87c91a24b3d2f5c21e7" Namespace="kube-system" Pod="coredns-668d6bf9bc-j248j" WorkloadEndpoint="ip--172--31--26--227-k8s-coredns--668d6bf9bc--j248j-eth0" Sep 13 00:47:59.869001 env[1726]: 2025-09-13 00:47:59.818 [INFO][4641] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali80b4eaf1821 ContainerID="c0105be3f439e6074e268de539114ab91ce501fe866dc87c91a24b3d2f5c21e7" Namespace="kube-system" Pod="coredns-668d6bf9bc-j248j" WorkloadEndpoint="ip--172--31--26--227-k8s-coredns--668d6bf9bc--j248j-eth0" Sep 13 00:47:59.869001 env[1726]: 2025-09-13 00:47:59.841 [INFO][4641] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c0105be3f439e6074e268de539114ab91ce501fe866dc87c91a24b3d2f5c21e7" Namespace="kube-system" Pod="coredns-668d6bf9bc-j248j" WorkloadEndpoint="ip--172--31--26--227-k8s-coredns--668d6bf9bc--j248j-eth0" Sep 13 00:47:59.869001 env[1726]: 2025-09-13 00:47:59.841 [INFO][4641] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="c0105be3f439e6074e268de539114ab91ce501fe866dc87c91a24b3d2f5c21e7" Namespace="kube-system" Pod="coredns-668d6bf9bc-j248j" WorkloadEndpoint="ip--172--31--26--227-k8s-coredns--668d6bf9bc--j248j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--227-k8s-coredns--668d6bf9bc--j248j-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"25e06c1f-1251-4571-ab79-6a6602efc42f", ResourceVersion:"960", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 47, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-227", ContainerID:"c0105be3f439e6074e268de539114ab91ce501fe866dc87c91a24b3d2f5c21e7", Pod:"coredns-668d6bf9bc-j248j", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.43.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali80b4eaf1821", MAC:"a2:e7:20:a1:fe:ec", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:47:59.869001 env[1726]: 2025-09-13 00:47:59.861 [INFO][4641] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="c0105be3f439e6074e268de539114ab91ce501fe866dc87c91a24b3d2f5c21e7" Namespace="kube-system" Pod="coredns-668d6bf9bc-j248j" WorkloadEndpoint="ip--172--31--26--227-k8s-coredns--668d6bf9bc--j248j-eth0" Sep 13 00:47:59.907957 env[1726]: time="2025-09-13T00:47:59.907866651Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:47:59.908149 env[1726]: time="2025-09-13T00:47:59.907939406Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:47:59.908149 env[1726]: time="2025-09-13T00:47:59.908124597Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:47:59.908560 env[1726]: time="2025-09-13T00:47:59.908496111Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c0105be3f439e6074e268de539114ab91ce501fe866dc87c91a24b3d2f5c21e7 pid=4676 runtime=io.containerd.runc.v2 Sep 13 00:47:59.927845 systemd-networkd[1456]: cali2543d660658: Gained IPv6LL Sep 13 00:47:59.945417 systemd[1]: Started cri-containerd-c0105be3f439e6074e268de539114ab91ce501fe866dc87c91a24b3d2f5c21e7.scope. Sep 13 00:47:59.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:59.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:59.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:59.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:59.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:59.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:59.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:59.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:59.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:59.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:59.974000 audit: BPF prog-id=184 op=LOAD Sep 13 00:47:59.974000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:59.974000 audit[4687]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4676 pid=4687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:59.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330313035626533663433396536303734653236386465353339313134 Sep 13 00:47:59.974000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:59.974000 audit[4687]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=4676 pid=4687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:59.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330313035626533663433396536303734653236386465353339313134 Sep 13 00:47:59.974000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:59.974000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:59.974000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:59.974000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:59.974000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:59.974000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:59.974000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:59.974000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:59.974000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:59.974000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:59.974000 audit: BPF prog-id=185 op=LOAD Sep 13 00:47:59.974000 audit[4687]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0001a7150 items=0 ppid=4676 pid=4687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:59.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330313035626533663433396536303734653236386465353339313134 Sep 13 00:47:59.975000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:59.975000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:59.975000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:59.975000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:59.975000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:59.975000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:59.975000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:59.975000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:59.975000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:59.975000 audit: BPF prog-id=186 op=LOAD Sep 13 00:47:59.975000 audit[4687]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0001a7198 items=0 ppid=4676 pid=4687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:59.975000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330313035626533663433396536303734653236386465353339313134 Sep 13 00:47:59.975000 audit: BPF prog-id=186 op=UNLOAD Sep 13 00:47:59.975000 audit: BPF prog-id=185 op=UNLOAD Sep 13 00:47:59.975000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:59.975000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:59.975000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:59.975000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:59.975000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:59.975000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:59.975000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:59.975000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:59.975000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:59.975000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:47:59.975000 audit: BPF prog-id=187 op=LOAD Sep 13 00:47:59.975000 audit[4687]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0001a75a8 items=0 ppid=4676 pid=4687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:47:59.975000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330313035626533663433396536303734653236386465353339313134 Sep 13 00:47:59.990051 systemd-networkd[1456]: calid7d7ed5354e: Gained IPv6LL Sep 13 00:48:00.017630 systemd[1]: Started sshd@7-172.31.26.227:22-101.126.10.196:46274.service. Sep 13 00:48:00.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.26.227:22-101.126.10.196:46274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:00.078931 env[1726]: time="2025-09-13T00:48:00.077313272Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-j248j,Uid:25e06c1f-1251-4571-ab79-6a6602efc42f,Namespace:kube-system,Attempt:1,} returns sandbox id \"c0105be3f439e6074e268de539114ab91ce501fe866dc87c91a24b3d2f5c21e7\"" Sep 13 00:48:00.094803 env[1726]: time="2025-09-13T00:48:00.094184708Z" level=info msg="CreateContainer within sandbox \"c0105be3f439e6074e268de539114ab91ce501fe866dc87c91a24b3d2f5c21e7\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Sep 13 00:48:00.161000 audit[4714]: NETFILTER_CFG table=filter:108 family=2 entries=50 op=nft_register_chain pid=4714 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:48:00.161000 audit[4714]: SYSCALL arch=c000003e syscall=46 success=yes exit=24928 a0=3 a1=7fff5a2fe430 a2=0 a3=7fff5a2fe41c items=0 ppid=4141 pid=4714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:00.161000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:48:00.258005 env[1726]: time="2025-09-13T00:48:00.256921531Z" level=info msg="CreateContainer within sandbox \"c0105be3f439e6074e268de539114ab91ce501fe866dc87c91a24b3d2f5c21e7\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"9ea358d68a47f5b8386918716cb81f0280584cdd1b7db1b2f2016480eef8cac2\"" Sep 13 00:48:00.260640 env[1726]: time="2025-09-13T00:48:00.260593070Z" level=info msg="StartContainer for \"9ea358d68a47f5b8386918716cb81f0280584cdd1b7db1b2f2016480eef8cac2\"" Sep 13 00:48:00.324456 systemd[1]: Started cri-containerd-9ea358d68a47f5b8386918716cb81f0280584cdd1b7db1b2f2016480eef8cac2.scope. Sep 13 00:48:00.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:00.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:00.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:00.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:00.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:00.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:00.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:00.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:00.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:00.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:00.407000 audit: BPF prog-id=188 op=LOAD Sep 13 00:48:00.409000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:00.409000 audit[4723]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4676 pid=4723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:00.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965613335386436386134376635623833383639313837313663623831 Sep 13 00:48:00.409000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:00.409000 audit[4723]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4676 pid=4723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:00.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965613335386436386134376635623833383639313837313663623831 Sep 13 00:48:00.410000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:00.410000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:00.410000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:00.410000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:00.410000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:00.410000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:00.410000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:00.410000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:00.410000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:00.410000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:00.410000 audit: BPF prog-id=189 op=LOAD Sep 13 00:48:00.410000 audit[4723]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003bcda0 items=0 ppid=4676 pid=4723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:00.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965613335386436386134376635623833383639313837313663623831 Sep 13 00:48:00.411000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:00.411000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:00.411000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:00.411000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:00.411000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:00.411000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:00.411000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:00.411000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:00.411000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:00.411000 audit: BPF prog-id=190 op=LOAD Sep 13 00:48:00.411000 audit[4723]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003bcde8 items=0 ppid=4676 pid=4723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:00.411000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965613335386436386134376635623833383639313837313663623831 Sep 13 00:48:00.412000 audit: BPF prog-id=190 op=UNLOAD Sep 13 00:48:00.412000 audit: BPF prog-id=189 op=UNLOAD Sep 13 00:48:00.412000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:00.412000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:00.412000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:00.412000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:00.412000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:00.412000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:00.412000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:00.412000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:00.412000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:00.412000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:00.412000 audit: BPF prog-id=191 op=LOAD Sep 13 00:48:00.412000 audit[4723]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003bd1f8 items=0 ppid=4676 pid=4723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:00.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965613335386436386134376635623833383639313837313663623831 Sep 13 00:48:00.523310 env[1726]: time="2025-09-13T00:48:00.523249389Z" level=info msg="StopPodSandbox for \"c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d\"" Sep 13 00:48:00.541918 env[1726]: time="2025-09-13T00:48:00.541862405Z" level=info msg="StopPodSandbox for \"ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a\"" Sep 13 00:48:00.550228 env[1726]: time="2025-09-13T00:48:00.549451049Z" level=info msg="StopPodSandbox for \"bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051\"" Sep 13 00:48:00.565612 env[1726]: time="2025-09-13T00:48:00.565487425Z" level=info msg="StartContainer for \"9ea358d68a47f5b8386918716cb81f0280584cdd1b7db1b2f2016480eef8cac2\" returns successfully" Sep 13 00:48:00.626664 systemd[1]: run-containerd-runc-k8s.io-c0105be3f439e6074e268de539114ab91ce501fe866dc87c91a24b3d2f5c21e7-runc.6I4fvs.mount: Deactivated successfully. Sep 13 00:48:00.834097 kubelet[2611]: I0913 00:48:00.831620 2611 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Sep 13 00:48:00.997359 env[1726]: 2025-09-13 00:48:00.819 [INFO][4768] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d" Sep 13 00:48:00.997359 env[1726]: 2025-09-13 00:48:00.820 [INFO][4768] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d" iface="eth0" netns="/var/run/netns/cni-0f432e36-4751-53a9-1904-06bdd60c4e88" Sep 13 00:48:00.997359 env[1726]: 2025-09-13 00:48:00.820 [INFO][4768] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d" iface="eth0" netns="/var/run/netns/cni-0f432e36-4751-53a9-1904-06bdd60c4e88" Sep 13 00:48:00.997359 env[1726]: 2025-09-13 00:48:00.820 [INFO][4768] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d" iface="eth0" netns="/var/run/netns/cni-0f432e36-4751-53a9-1904-06bdd60c4e88" Sep 13 00:48:00.997359 env[1726]: 2025-09-13 00:48:00.820 [INFO][4768] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d" Sep 13 00:48:00.997359 env[1726]: 2025-09-13 00:48:00.820 [INFO][4768] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d" Sep 13 00:48:00.997359 env[1726]: 2025-09-13 00:48:00.952 [INFO][4792] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d" HandleID="k8s-pod-network.c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d" Workload="ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--65mmj-eth0" Sep 13 00:48:00.997359 env[1726]: 2025-09-13 00:48:00.952 [INFO][4792] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:48:00.997359 env[1726]: 2025-09-13 00:48:00.953 [INFO][4792] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:48:00.997359 env[1726]: 2025-09-13 00:48:00.972 [WARNING][4792] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d" HandleID="k8s-pod-network.c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d" Workload="ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--65mmj-eth0" Sep 13 00:48:00.997359 env[1726]: 2025-09-13 00:48:00.974 [INFO][4792] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d" HandleID="k8s-pod-network.c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d" Workload="ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--65mmj-eth0" Sep 13 00:48:00.997359 env[1726]: 2025-09-13 00:48:00.983 [INFO][4792] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:48:00.997359 env[1726]: 2025-09-13 00:48:00.989 [INFO][4768] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d" Sep 13 00:48:01.002341 systemd[1]: run-netns-cni\x2d0f432e36\x2d4751\x2d53a9\x2d1904\x2d06bdd60c4e88.mount: Deactivated successfully. Sep 13 00:48:01.005265 env[1726]: time="2025-09-13T00:48:01.005213035Z" level=info msg="TearDown network for sandbox \"c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d\" successfully" Sep 13 00:48:01.005434 env[1726]: time="2025-09-13T00:48:01.005409679Z" level=info msg="StopPodSandbox for \"c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d\" returns successfully" Sep 13 00:48:01.008983 env[1726]: time="2025-09-13T00:48:01.006291986Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75d655b7b-65mmj,Uid:3c832220-40d0-406a-bbd8-8df3c514c55e,Namespace:calico-apiserver,Attempt:1,}" Sep 13 00:48:01.037626 kernel: kauditd_printk_skb: 870 callbacks suppressed Sep 13 00:48:01.037772 kernel: audit: type=1325 audit(1757724481.026:1186): table=filter:109 family=2 entries=20 op=nft_register_rule pid=4820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:48:01.037810 kernel: audit: type=1300 audit(1757724481.026:1186): arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffc8cfaedd0 a2=0 a3=7ffc8cfaedbc items=0 ppid=2978 pid=4820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:01.026000 audit[4820]: NETFILTER_CFG table=filter:109 family=2 entries=20 op=nft_register_rule pid=4820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:48:01.026000 audit[4820]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffc8cfaedd0 a2=0 a3=7ffc8cfaedbc items=0 ppid=2978 pid=4820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:01.026000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:48:01.057245 kernel: audit: type=1327 audit(1757724481.026:1186): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:48:01.057477 kernel: audit: type=1325 audit(1757724481.038:1187): table=nat:110 family=2 entries=14 op=nft_register_rule pid=4820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:48:01.057525 kernel: audit: type=1300 audit(1757724481.038:1187): arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffc8cfaedd0 a2=0 a3=0 items=0 ppid=2978 pid=4820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:01.038000 audit[4820]: NETFILTER_CFG table=nat:110 family=2 entries=14 op=nft_register_rule pid=4820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:48:01.038000 audit[4820]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffc8cfaedd0 a2=0 a3=0 items=0 ppid=2978 pid=4820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:01.053759 sshd[4707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.126.10.196 user=root Sep 13 00:48:01.056881 systemd[1]: run-containerd-runc-k8s.io-6cb8aba7eee7989057b44821b41666c8cd75bc55cca167837f802d52af7b74ec-runc.tgZ1gZ.mount: Deactivated successfully. Sep 13 00:48:01.072822 kernel: audit: type=1327 audit(1757724481.038:1187): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:48:01.038000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:48:01.055000 audit[4707]: USER_AUTH pid=4707 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.126.10.196 addr=101.126.10.196 terminal=ssh res=failed' Sep 13 00:48:01.078875 kernel: audit: type=1100 audit(1757724481.055:1188): pid=4707 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.126.10.196 addr=101.126.10.196 terminal=ssh res=failed' Sep 13 00:48:01.116993 env[1726]: 2025-09-13 00:48:00.844 [INFO][4777] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a" Sep 13 00:48:01.116993 env[1726]: 2025-09-13 00:48:00.844 [INFO][4777] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a" iface="eth0" netns="/var/run/netns/cni-12b2a800-833e-f468-cd14-a446559ea61f" Sep 13 00:48:01.116993 env[1726]: 2025-09-13 00:48:00.844 [INFO][4777] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a" iface="eth0" netns="/var/run/netns/cni-12b2a800-833e-f468-cd14-a446559ea61f" Sep 13 00:48:01.116993 env[1726]: 2025-09-13 00:48:00.844 [INFO][4777] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a" iface="eth0" netns="/var/run/netns/cni-12b2a800-833e-f468-cd14-a446559ea61f" Sep 13 00:48:01.116993 env[1726]: 2025-09-13 00:48:00.845 [INFO][4777] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a" Sep 13 00:48:01.116993 env[1726]: 2025-09-13 00:48:00.845 [INFO][4777] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a" Sep 13 00:48:01.116993 env[1726]: 2025-09-13 00:48:01.015 [INFO][4798] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a" HandleID="k8s-pod-network.ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a" Workload="ip--172--31--26--227-k8s-goldmane--54d579b49d--krd8k-eth0" Sep 13 00:48:01.116993 env[1726]: 2025-09-13 00:48:01.015 [INFO][4798] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:48:01.116993 env[1726]: 2025-09-13 00:48:01.015 [INFO][4798] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:48:01.116993 env[1726]: 2025-09-13 00:48:01.074 [WARNING][4798] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a" HandleID="k8s-pod-network.ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a" Workload="ip--172--31--26--227-k8s-goldmane--54d579b49d--krd8k-eth0" Sep 13 00:48:01.116993 env[1726]: 2025-09-13 00:48:01.075 [INFO][4798] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a" HandleID="k8s-pod-network.ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a" Workload="ip--172--31--26--227-k8s-goldmane--54d579b49d--krd8k-eth0" Sep 13 00:48:01.116993 env[1726]: 2025-09-13 00:48:01.090 [INFO][4798] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:48:01.116993 env[1726]: 2025-09-13 00:48:01.094 [INFO][4777] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a" Sep 13 00:48:01.118249 env[1726]: time="2025-09-13T00:48:01.118206311Z" level=info msg="TearDown network for sandbox \"ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a\" successfully" Sep 13 00:48:01.118379 env[1726]: time="2025-09-13T00:48:01.118358730Z" level=info msg="StopPodSandbox for \"ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a\" returns successfully" Sep 13 00:48:01.135476 env[1726]: time="2025-09-13T00:48:01.135428600Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-54d579b49d-krd8k,Uid:908b4e5f-addd-4d5c-a146-1b9da1f1b4f4,Namespace:calico-system,Attempt:1,}" Sep 13 00:48:01.142798 env[1726]: 2025-09-13 00:48:00.855 [INFO][4778] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051" Sep 13 00:48:01.142798 env[1726]: 2025-09-13 00:48:00.857 [INFO][4778] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051" iface="eth0" netns="/var/run/netns/cni-d2f30163-cba8-e2f9-1a58-8c897eb6ee8c" Sep 13 00:48:01.142798 env[1726]: 2025-09-13 00:48:00.858 [INFO][4778] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051" iface="eth0" netns="/var/run/netns/cni-d2f30163-cba8-e2f9-1a58-8c897eb6ee8c" Sep 13 00:48:01.142798 env[1726]: 2025-09-13 00:48:00.859 [INFO][4778] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051" iface="eth0" netns="/var/run/netns/cni-d2f30163-cba8-e2f9-1a58-8c897eb6ee8c" Sep 13 00:48:01.142798 env[1726]: 2025-09-13 00:48:00.859 [INFO][4778] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051" Sep 13 00:48:01.142798 env[1726]: 2025-09-13 00:48:00.859 [INFO][4778] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051" Sep 13 00:48:01.142798 env[1726]: 2025-09-13 00:48:01.099 [INFO][4803] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051" HandleID="k8s-pod-network.bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051" Workload="ip--172--31--26--227-k8s-coredns--668d6bf9bc--rwnwd-eth0" Sep 13 00:48:01.142798 env[1726]: 2025-09-13 00:48:01.100 [INFO][4803] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:48:01.142798 env[1726]: 2025-09-13 00:48:01.100 [INFO][4803] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:48:01.142798 env[1726]: 2025-09-13 00:48:01.113 [WARNING][4803] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051" HandleID="k8s-pod-network.bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051" Workload="ip--172--31--26--227-k8s-coredns--668d6bf9bc--rwnwd-eth0" Sep 13 00:48:01.142798 env[1726]: 2025-09-13 00:48:01.113 [INFO][4803] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051" HandleID="k8s-pod-network.bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051" Workload="ip--172--31--26--227-k8s-coredns--668d6bf9bc--rwnwd-eth0" Sep 13 00:48:01.142798 env[1726]: 2025-09-13 00:48:01.120 [INFO][4803] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:48:01.142798 env[1726]: 2025-09-13 00:48:01.126 [INFO][4778] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051" Sep 13 00:48:01.143856 env[1726]: time="2025-09-13T00:48:01.143812371Z" level=info msg="TearDown network for sandbox \"bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051\" successfully" Sep 13 00:48:01.143984 env[1726]: time="2025-09-13T00:48:01.143957886Z" level=info msg="StopPodSandbox for \"bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051\" returns successfully" Sep 13 00:48:01.144897 env[1726]: time="2025-09-13T00:48:01.144842206Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-rwnwd,Uid:9c1c985e-0356-4c2e-9ae2-014973546f81,Namespace:kube-system,Attempt:1,}" Sep 13 00:48:01.276305 systemd-networkd[1456]: cali80b4eaf1821: Gained IPv6LL Sep 13 00:48:01.539262 env[1726]: time="2025-09-13T00:48:01.537586199Z" level=info msg="StopPodSandbox for \"a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a\"" Sep 13 00:48:01.659496 systemd[1]: run-netns-cni\x2d12b2a800\x2d833e\x2df468\x2dcd14\x2da446559ea61f.mount: Deactivated successfully. Sep 13 00:48:01.664735 systemd[1]: run-netns-cni\x2dd2f30163\x2dcba8\x2de2f9\x2d1a58\x2d8c897eb6ee8c.mount: Deactivated successfully. Sep 13 00:48:01.785623 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:48:01.785772 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1500d249cae: link becomes ready Sep 13 00:48:01.816152 systemd-networkd[1456]: cali1500d249cae: Link UP Sep 13 00:48:01.816377 systemd-networkd[1456]: cali1500d249cae: Gained carrier Sep 13 00:48:01.964819 kubelet[2611]: I0913 00:48:01.923837 2611 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-j248j" podStartSLOduration=44.904325793 podStartE2EDuration="44.904325793s" podCreationTimestamp="2025-09-13 00:47:17 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-13 00:48:00.907811216 +0000 UTC m=+48.596925217" watchObservedRunningTime="2025-09-13 00:48:01.904325793 +0000 UTC m=+49.593439793" Sep 13 00:48:01.965383 env[1726]: 2025-09-13 00:48:01.195 [INFO][4823] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--65mmj-eth0 calico-apiserver-75d655b7b- calico-apiserver 3c832220-40d0-406a-bbd8-8df3c514c55e 975 0 2025-09-13 00:47:30 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:75d655b7b projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-26-227 calico-apiserver-75d655b7b-65mmj eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali1500d249cae [] [] }} ContainerID="d5b033a9f41ca9b9e35620f43a5cf0e836b873c77c5b0bf707d859712fd7ea36" Namespace="calico-apiserver" Pod="calico-apiserver-75d655b7b-65mmj" WorkloadEndpoint="ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--65mmj-" Sep 13 00:48:01.965383 env[1726]: 2025-09-13 00:48:01.195 [INFO][4823] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="d5b033a9f41ca9b9e35620f43a5cf0e836b873c77c5b0bf707d859712fd7ea36" Namespace="calico-apiserver" Pod="calico-apiserver-75d655b7b-65mmj" WorkloadEndpoint="ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--65mmj-eth0" Sep 13 00:48:01.965383 env[1726]: 2025-09-13 00:48:01.378 [INFO][4847] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d5b033a9f41ca9b9e35620f43a5cf0e836b873c77c5b0bf707d859712fd7ea36" HandleID="k8s-pod-network.d5b033a9f41ca9b9e35620f43a5cf0e836b873c77c5b0bf707d859712fd7ea36" Workload="ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--65mmj-eth0" Sep 13 00:48:01.965383 env[1726]: 2025-09-13 00:48:01.384 [INFO][4847] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d5b033a9f41ca9b9e35620f43a5cf0e836b873c77c5b0bf707d859712fd7ea36" HandleID="k8s-pod-network.d5b033a9f41ca9b9e35620f43a5cf0e836b873c77c5b0bf707d859712fd7ea36" Workload="ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--65mmj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000125540), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-26-227", "pod":"calico-apiserver-75d655b7b-65mmj", "timestamp":"2025-09-13 00:48:01.378194953 +0000 UTC"}, Hostname:"ip-172-31-26-227", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:48:01.965383 env[1726]: 2025-09-13 00:48:01.384 [INFO][4847] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:48:01.965383 env[1726]: 2025-09-13 00:48:01.385 [INFO][4847] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:48:01.965383 env[1726]: 2025-09-13 00:48:01.385 [INFO][4847] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-26-227' Sep 13 00:48:01.965383 env[1726]: 2025-09-13 00:48:01.436 [INFO][4847] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.d5b033a9f41ca9b9e35620f43a5cf0e836b873c77c5b0bf707d859712fd7ea36" host="ip-172-31-26-227" Sep 13 00:48:01.965383 env[1726]: 2025-09-13 00:48:01.468 [INFO][4847] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-26-227" Sep 13 00:48:01.965383 env[1726]: 2025-09-13 00:48:01.601 [INFO][4847] ipam/ipam.go 511: Trying affinity for 192.168.43.64/26 host="ip-172-31-26-227" Sep 13 00:48:01.965383 env[1726]: 2025-09-13 00:48:01.620 [INFO][4847] ipam/ipam.go 158: Attempting to load block cidr=192.168.43.64/26 host="ip-172-31-26-227" Sep 13 00:48:01.965383 env[1726]: 2025-09-13 00:48:01.682 [INFO][4847] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.43.64/26 host="ip-172-31-26-227" Sep 13 00:48:01.965383 env[1726]: 2025-09-13 00:48:01.682 [INFO][4847] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.43.64/26 handle="k8s-pod-network.d5b033a9f41ca9b9e35620f43a5cf0e836b873c77c5b0bf707d859712fd7ea36" host="ip-172-31-26-227" Sep 13 00:48:01.965383 env[1726]: 2025-09-13 00:48:01.703 [INFO][4847] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.d5b033a9f41ca9b9e35620f43a5cf0e836b873c77c5b0bf707d859712fd7ea36 Sep 13 00:48:01.965383 env[1726]: 2025-09-13 00:48:01.721 [INFO][4847] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.43.64/26 handle="k8s-pod-network.d5b033a9f41ca9b9e35620f43a5cf0e836b873c77c5b0bf707d859712fd7ea36" host="ip-172-31-26-227" Sep 13 00:48:01.965383 env[1726]: 2025-09-13 00:48:01.757 [INFO][4847] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.43.69/26] block=192.168.43.64/26 handle="k8s-pod-network.d5b033a9f41ca9b9e35620f43a5cf0e836b873c77c5b0bf707d859712fd7ea36" host="ip-172-31-26-227" Sep 13 00:48:01.965383 env[1726]: 2025-09-13 00:48:01.757 [INFO][4847] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.43.69/26] handle="k8s-pod-network.d5b033a9f41ca9b9e35620f43a5cf0e836b873c77c5b0bf707d859712fd7ea36" host="ip-172-31-26-227" Sep 13 00:48:01.965383 env[1726]: 2025-09-13 00:48:01.757 [INFO][4847] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:48:01.965383 env[1726]: 2025-09-13 00:48:01.757 [INFO][4847] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.43.69/26] IPv6=[] ContainerID="d5b033a9f41ca9b9e35620f43a5cf0e836b873c77c5b0bf707d859712fd7ea36" HandleID="k8s-pod-network.d5b033a9f41ca9b9e35620f43a5cf0e836b873c77c5b0bf707d859712fd7ea36" Workload="ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--65mmj-eth0" Sep 13 00:48:01.967524 env[1726]: 2025-09-13 00:48:01.776 [INFO][4823] cni-plugin/k8s.go 418: Populated endpoint ContainerID="d5b033a9f41ca9b9e35620f43a5cf0e836b873c77c5b0bf707d859712fd7ea36" Namespace="calico-apiserver" Pod="calico-apiserver-75d655b7b-65mmj" WorkloadEndpoint="ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--65mmj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--65mmj-eth0", GenerateName:"calico-apiserver-75d655b7b-", Namespace:"calico-apiserver", SelfLink:"", UID:"3c832220-40d0-406a-bbd8-8df3c514c55e", ResourceVersion:"975", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 47, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75d655b7b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-227", ContainerID:"", Pod:"calico-apiserver-75d655b7b-65mmj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.43.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1500d249cae", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:48:01.967524 env[1726]: 2025-09-13 00:48:01.776 [INFO][4823] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.43.69/32] ContainerID="d5b033a9f41ca9b9e35620f43a5cf0e836b873c77c5b0bf707d859712fd7ea36" Namespace="calico-apiserver" Pod="calico-apiserver-75d655b7b-65mmj" WorkloadEndpoint="ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--65mmj-eth0" Sep 13 00:48:01.967524 env[1726]: 2025-09-13 00:48:01.776 [INFO][4823] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali1500d249cae ContainerID="d5b033a9f41ca9b9e35620f43a5cf0e836b873c77c5b0bf707d859712fd7ea36" Namespace="calico-apiserver" Pod="calico-apiserver-75d655b7b-65mmj" WorkloadEndpoint="ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--65mmj-eth0" Sep 13 00:48:01.967524 env[1726]: 2025-09-13 00:48:01.786 [INFO][4823] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d5b033a9f41ca9b9e35620f43a5cf0e836b873c77c5b0bf707d859712fd7ea36" Namespace="calico-apiserver" Pod="calico-apiserver-75d655b7b-65mmj" WorkloadEndpoint="ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--65mmj-eth0" Sep 13 00:48:01.967524 env[1726]: 2025-09-13 00:48:01.786 [INFO][4823] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="d5b033a9f41ca9b9e35620f43a5cf0e836b873c77c5b0bf707d859712fd7ea36" Namespace="calico-apiserver" Pod="calico-apiserver-75d655b7b-65mmj" WorkloadEndpoint="ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--65mmj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--65mmj-eth0", GenerateName:"calico-apiserver-75d655b7b-", Namespace:"calico-apiserver", SelfLink:"", UID:"3c832220-40d0-406a-bbd8-8df3c514c55e", ResourceVersion:"975", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 47, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75d655b7b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-227", ContainerID:"d5b033a9f41ca9b9e35620f43a5cf0e836b873c77c5b0bf707d859712fd7ea36", Pod:"calico-apiserver-75d655b7b-65mmj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.43.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1500d249cae", MAC:"ba:e5:e5:a0:54:56", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:48:01.967524 env[1726]: 2025-09-13 00:48:01.898 [INFO][4823] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="d5b033a9f41ca9b9e35620f43a5cf0e836b873c77c5b0bf707d859712fd7ea36" Namespace="calico-apiserver" Pod="calico-apiserver-75d655b7b-65mmj" WorkloadEndpoint="ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--65mmj-eth0" Sep 13 00:48:02.286446 env[1726]: time="2025-09-13T00:48:02.286361050Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:48:02.286741 env[1726]: time="2025-09-13T00:48:02.286697956Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:48:02.286902 env[1726]: time="2025-09-13T00:48:02.286877085Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:48:02.287328 env[1726]: time="2025-09-13T00:48:02.287282710Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d5b033a9f41ca9b9e35620f43a5cf0e836b873c77c5b0bf707d859712fd7ea36 pid=4926 runtime=io.containerd.runc.v2 Sep 13 00:48:02.469777 systemd[1]: Started cri-containerd-d5b033a9f41ca9b9e35620f43a5cf0e836b873c77c5b0bf707d859712fd7ea36.scope. Sep 13 00:48:02.565302 systemd[1]: run-containerd-runc-k8s.io-d5b033a9f41ca9b9e35620f43a5cf0e836b873c77c5b0bf707d859712fd7ea36-runc.r4z6EY.mount: Deactivated successfully. Sep 13 00:48:02.589953 sshd[4707]: Failed password for root from 101.126.10.196 port 46274 ssh2 Sep 13 00:48:02.678674 systemd-networkd[1456]: cali71d91ac77ec: Link UP Sep 13 00:48:02.688347 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali71d91ac77ec: link becomes ready Sep 13 00:48:02.688920 systemd-networkd[1456]: cali71d91ac77ec: Gained carrier Sep 13 00:48:02.833412 kernel: audit: type=1400 audit(1757724482.802:1189): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:02.833605 kernel: audit: type=1400 audit(1757724482.802:1190): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:02.833653 kernel: audit: type=1400 audit(1757724482.802:1191): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:02.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:02.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:02.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:02.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:02.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:02.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:02.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:02.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:02.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:02.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:02.812000 audit: BPF prog-id=192 op=LOAD Sep 13 00:48:02.812000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:02.812000 audit[4934]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4926 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:02.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435623033336139663431636139623965333536323066343361356366 Sep 13 00:48:02.812000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:02.812000 audit[4934]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4926 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:02.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435623033336139663431636139623965333536323066343361356366 Sep 13 00:48:02.821000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:02.821000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:02.821000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:02.821000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:02.821000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:02.821000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:02.821000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:02.821000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:02.821000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:02.821000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:02.821000 audit: BPF prog-id=193 op=LOAD Sep 13 00:48:02.821000 audit[4934]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000388ec0 items=0 ppid=4926 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:02.821000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435623033336139663431636139623965333536323066343361356366 Sep 13 00:48:02.833000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:02.833000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:02.833000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:02.833000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:02.833000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:02.833000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:02.833000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:02.833000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:02.833000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:02.833000 audit: BPF prog-id=194 op=LOAD Sep 13 00:48:02.833000 audit[4934]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000388f08 items=0 ppid=4926 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:02.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435623033336139663431636139623965333536323066343361356366 Sep 13 00:48:02.833000 audit: BPF prog-id=194 op=UNLOAD Sep 13 00:48:02.833000 audit: BPF prog-id=193 op=UNLOAD Sep 13 00:48:02.833000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:02.833000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:02.833000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:02.833000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:02.833000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:02.833000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:02.833000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:02.833000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:02.833000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:02.833000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:02.833000 audit: BPF prog-id=195 op=LOAD Sep 13 00:48:02.833000 audit[4934]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000389318 items=0 ppid=4926 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:02.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435623033336139663431636139623965333536323066343361356366 Sep 13 00:48:02.850066 env[1726]: 2025-09-13 00:48:01.385 [INFO][4841] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--26--227-k8s-goldmane--54d579b49d--krd8k-eth0 goldmane-54d579b49d- calico-system 908b4e5f-addd-4d5c-a146-1b9da1f1b4f4 976 0 2025-09-13 00:47:33 +0000 UTC map[app.kubernetes.io/name:goldmane k8s-app:goldmane pod-template-hash:54d579b49d projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:goldmane] map[] [] [] []} {k8s ip-172-31-26-227 goldmane-54d579b49d-krd8k eth0 goldmane [] [] [kns.calico-system ksa.calico-system.goldmane] cali71d91ac77ec [] [] }} ContainerID="9870e5e3afcdef073f5cd2d7b0aca7ef5ad2fa927f01b068251c11360409e173" Namespace="calico-system" Pod="goldmane-54d579b49d-krd8k" WorkloadEndpoint="ip--172--31--26--227-k8s-goldmane--54d579b49d--krd8k-" Sep 13 00:48:02.850066 env[1726]: 2025-09-13 00:48:01.385 [INFO][4841] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="9870e5e3afcdef073f5cd2d7b0aca7ef5ad2fa927f01b068251c11360409e173" Namespace="calico-system" Pod="goldmane-54d579b49d-krd8k" WorkloadEndpoint="ip--172--31--26--227-k8s-goldmane--54d579b49d--krd8k-eth0" Sep 13 00:48:02.850066 env[1726]: 2025-09-13 00:48:02.159 [INFO][4879] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9870e5e3afcdef073f5cd2d7b0aca7ef5ad2fa927f01b068251c11360409e173" HandleID="k8s-pod-network.9870e5e3afcdef073f5cd2d7b0aca7ef5ad2fa927f01b068251c11360409e173" Workload="ip--172--31--26--227-k8s-goldmane--54d579b49d--krd8k-eth0" Sep 13 00:48:02.850066 env[1726]: 2025-09-13 00:48:02.160 [INFO][4879] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="9870e5e3afcdef073f5cd2d7b0aca7ef5ad2fa927f01b068251c11360409e173" HandleID="k8s-pod-network.9870e5e3afcdef073f5cd2d7b0aca7ef5ad2fa927f01b068251c11360409e173" Workload="ip--172--31--26--227-k8s-goldmane--54d579b49d--krd8k-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000225e20), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-26-227", "pod":"goldmane-54d579b49d-krd8k", "timestamp":"2025-09-13 00:48:02.159250203 +0000 UTC"}, Hostname:"ip-172-31-26-227", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:48:02.850066 env[1726]: 2025-09-13 00:48:02.160 [INFO][4879] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:48:02.850066 env[1726]: 2025-09-13 00:48:02.160 [INFO][4879] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:48:02.850066 env[1726]: 2025-09-13 00:48:02.161 [INFO][4879] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-26-227' Sep 13 00:48:02.850066 env[1726]: 2025-09-13 00:48:02.228 [INFO][4879] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.9870e5e3afcdef073f5cd2d7b0aca7ef5ad2fa927f01b068251c11360409e173" host="ip-172-31-26-227" Sep 13 00:48:02.850066 env[1726]: 2025-09-13 00:48:02.305 [INFO][4879] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-26-227" Sep 13 00:48:02.850066 env[1726]: 2025-09-13 00:48:02.379 [INFO][4879] ipam/ipam.go 511: Trying affinity for 192.168.43.64/26 host="ip-172-31-26-227" Sep 13 00:48:02.850066 env[1726]: 2025-09-13 00:48:02.420 [INFO][4879] ipam/ipam.go 158: Attempting to load block cidr=192.168.43.64/26 host="ip-172-31-26-227" Sep 13 00:48:02.850066 env[1726]: 2025-09-13 00:48:02.444 [INFO][4879] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.43.64/26 host="ip-172-31-26-227" Sep 13 00:48:02.850066 env[1726]: 2025-09-13 00:48:02.444 [INFO][4879] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.43.64/26 handle="k8s-pod-network.9870e5e3afcdef073f5cd2d7b0aca7ef5ad2fa927f01b068251c11360409e173" host="ip-172-31-26-227" Sep 13 00:48:02.850066 env[1726]: 2025-09-13 00:48:02.459 [INFO][4879] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.9870e5e3afcdef073f5cd2d7b0aca7ef5ad2fa927f01b068251c11360409e173 Sep 13 00:48:02.850066 env[1726]: 2025-09-13 00:48:02.504 [INFO][4879] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.43.64/26 handle="k8s-pod-network.9870e5e3afcdef073f5cd2d7b0aca7ef5ad2fa927f01b068251c11360409e173" host="ip-172-31-26-227" Sep 13 00:48:02.850066 env[1726]: 2025-09-13 00:48:02.601 [INFO][4879] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.43.70/26] block=192.168.43.64/26 handle="k8s-pod-network.9870e5e3afcdef073f5cd2d7b0aca7ef5ad2fa927f01b068251c11360409e173" host="ip-172-31-26-227" Sep 13 00:48:02.850066 env[1726]: 2025-09-13 00:48:02.601 [INFO][4879] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.43.70/26] handle="k8s-pod-network.9870e5e3afcdef073f5cd2d7b0aca7ef5ad2fa927f01b068251c11360409e173" host="ip-172-31-26-227" Sep 13 00:48:02.850066 env[1726]: 2025-09-13 00:48:02.601 [INFO][4879] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:48:02.850066 env[1726]: 2025-09-13 00:48:02.601 [INFO][4879] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.43.70/26] IPv6=[] ContainerID="9870e5e3afcdef073f5cd2d7b0aca7ef5ad2fa927f01b068251c11360409e173" HandleID="k8s-pod-network.9870e5e3afcdef073f5cd2d7b0aca7ef5ad2fa927f01b068251c11360409e173" Workload="ip--172--31--26--227-k8s-goldmane--54d579b49d--krd8k-eth0" Sep 13 00:48:02.851348 env[1726]: 2025-09-13 00:48:02.656 [INFO][4841] cni-plugin/k8s.go 418: Populated endpoint ContainerID="9870e5e3afcdef073f5cd2d7b0aca7ef5ad2fa927f01b068251c11360409e173" Namespace="calico-system" Pod="goldmane-54d579b49d-krd8k" WorkloadEndpoint="ip--172--31--26--227-k8s-goldmane--54d579b49d--krd8k-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--227-k8s-goldmane--54d579b49d--krd8k-eth0", GenerateName:"goldmane-54d579b49d-", Namespace:"calico-system", SelfLink:"", UID:"908b4e5f-addd-4d5c-a146-1b9da1f1b4f4", ResourceVersion:"976", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 47, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"54d579b49d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-227", ContainerID:"", Pod:"goldmane-54d579b49d-krd8k", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.43.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali71d91ac77ec", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:48:02.851348 env[1726]: 2025-09-13 00:48:02.656 [INFO][4841] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.43.70/32] ContainerID="9870e5e3afcdef073f5cd2d7b0aca7ef5ad2fa927f01b068251c11360409e173" Namespace="calico-system" Pod="goldmane-54d579b49d-krd8k" WorkloadEndpoint="ip--172--31--26--227-k8s-goldmane--54d579b49d--krd8k-eth0" Sep 13 00:48:02.851348 env[1726]: 2025-09-13 00:48:02.656 [INFO][4841] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali71d91ac77ec ContainerID="9870e5e3afcdef073f5cd2d7b0aca7ef5ad2fa927f01b068251c11360409e173" Namespace="calico-system" Pod="goldmane-54d579b49d-krd8k" WorkloadEndpoint="ip--172--31--26--227-k8s-goldmane--54d579b49d--krd8k-eth0" Sep 13 00:48:02.851348 env[1726]: 2025-09-13 00:48:02.729 [INFO][4841] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="9870e5e3afcdef073f5cd2d7b0aca7ef5ad2fa927f01b068251c11360409e173" Namespace="calico-system" Pod="goldmane-54d579b49d-krd8k" WorkloadEndpoint="ip--172--31--26--227-k8s-goldmane--54d579b49d--krd8k-eth0" Sep 13 00:48:02.851348 env[1726]: 2025-09-13 00:48:02.736 [INFO][4841] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="9870e5e3afcdef073f5cd2d7b0aca7ef5ad2fa927f01b068251c11360409e173" Namespace="calico-system" Pod="goldmane-54d579b49d-krd8k" WorkloadEndpoint="ip--172--31--26--227-k8s-goldmane--54d579b49d--krd8k-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--227-k8s-goldmane--54d579b49d--krd8k-eth0", GenerateName:"goldmane-54d579b49d-", Namespace:"calico-system", SelfLink:"", UID:"908b4e5f-addd-4d5c-a146-1b9da1f1b4f4", ResourceVersion:"976", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 47, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"54d579b49d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-227", ContainerID:"9870e5e3afcdef073f5cd2d7b0aca7ef5ad2fa927f01b068251c11360409e173", Pod:"goldmane-54d579b49d-krd8k", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.43.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali71d91ac77ec", MAC:"9a:e5:2e:54:65:d7", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:48:02.851348 env[1726]: 2025-09-13 00:48:02.835 [INFO][4841] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="9870e5e3afcdef073f5cd2d7b0aca7ef5ad2fa927f01b068251c11360409e173" Namespace="calico-system" Pod="goldmane-54d579b49d-krd8k" WorkloadEndpoint="ip--172--31--26--227-k8s-goldmane--54d579b49d--krd8k-eth0" Sep 13 00:48:02.990816 env[1726]: 2025-09-13 00:48:02.644 [INFO][4908] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a" Sep 13 00:48:02.990816 env[1726]: 2025-09-13 00:48:02.644 [INFO][4908] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a" iface="eth0" netns="/var/run/netns/cni-5ee2545e-4390-588d-9f5e-fc029b874dc3" Sep 13 00:48:02.990816 env[1726]: 2025-09-13 00:48:02.644 [INFO][4908] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a" iface="eth0" netns="/var/run/netns/cni-5ee2545e-4390-588d-9f5e-fc029b874dc3" Sep 13 00:48:02.990816 env[1726]: 2025-09-13 00:48:02.644 [INFO][4908] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a" iface="eth0" netns="/var/run/netns/cni-5ee2545e-4390-588d-9f5e-fc029b874dc3" Sep 13 00:48:02.990816 env[1726]: 2025-09-13 00:48:02.644 [INFO][4908] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a" Sep 13 00:48:02.990816 env[1726]: 2025-09-13 00:48:02.644 [INFO][4908] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a" Sep 13 00:48:02.990816 env[1726]: 2025-09-13 00:48:02.922 [INFO][4960] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a" HandleID="k8s-pod-network.a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a" Workload="ip--172--31--26--227-k8s-csi--node--driver--gqprd-eth0" Sep 13 00:48:02.990816 env[1726]: 2025-09-13 00:48:02.922 [INFO][4960] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:48:02.990816 env[1726]: 2025-09-13 00:48:02.947 [INFO][4960] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:48:02.990816 env[1726]: 2025-09-13 00:48:02.958 [WARNING][4960] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a" HandleID="k8s-pod-network.a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a" Workload="ip--172--31--26--227-k8s-csi--node--driver--gqprd-eth0" Sep 13 00:48:02.990816 env[1726]: 2025-09-13 00:48:02.958 [INFO][4960] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a" HandleID="k8s-pod-network.a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a" Workload="ip--172--31--26--227-k8s-csi--node--driver--gqprd-eth0" Sep 13 00:48:02.990816 env[1726]: 2025-09-13 00:48:02.967 [INFO][4960] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:48:02.990816 env[1726]: 2025-09-13 00:48:02.973 [INFO][4908] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a" Sep 13 00:48:02.995106 env[1726]: time="2025-09-13T00:48:02.995048414Z" level=info msg="TearDown network for sandbox \"a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a\" successfully" Sep 13 00:48:02.995285 env[1726]: time="2025-09-13T00:48:02.995260491Z" level=info msg="StopPodSandbox for \"a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a\" returns successfully" Sep 13 00:48:03.001141 systemd[1]: run-netns-cni\x2d5ee2545e\x2d4390\x2d588d\x2d9f5e\x2dfc029b874dc3.mount: Deactivated successfully. Sep 13 00:48:03.008510 env[1726]: time="2025-09-13T00:48:03.008464091Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-gqprd,Uid:a9acc916-f8c5-498e-a936-eb42d96a2962,Namespace:calico-system,Attempt:1,}" Sep 13 00:48:03.020019 systemd-networkd[1456]: cali0125d8b26a4: Link UP Sep 13 00:48:03.024532 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:48:03.024653 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0125d8b26a4: link becomes ready Sep 13 00:48:03.024251 systemd-networkd[1456]: cali0125d8b26a4: Gained carrier Sep 13 00:48:03.059112 env[1726]: time="2025-09-13T00:48:03.059009941Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:48:03.059112 env[1726]: time="2025-09-13T00:48:03.059079651Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:48:03.060782 env[1726]: time="2025-09-13T00:48:03.059094686Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:48:03.060782 env[1726]: time="2025-09-13T00:48:03.059566195Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9870e5e3afcdef073f5cd2d7b0aca7ef5ad2fa927f01b068251c11360409e173 pid=4978 runtime=io.containerd.runc.v2 Sep 13 00:48:03.081671 env[1726]: 2025-09-13 00:48:01.442 [INFO][4854] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--26--227-k8s-coredns--668d6bf9bc--rwnwd-eth0 coredns-668d6bf9bc- kube-system 9c1c985e-0356-4c2e-9ae2-014973546f81 977 0 2025-09-13 00:47:17 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-26-227 coredns-668d6bf9bc-rwnwd eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali0125d8b26a4 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="16b289c6afddb0f7dd4b58a5712f2b29f8e636328c835cc521c6af1cfc2bbea0" Namespace="kube-system" Pod="coredns-668d6bf9bc-rwnwd" WorkloadEndpoint="ip--172--31--26--227-k8s-coredns--668d6bf9bc--rwnwd-" Sep 13 00:48:03.081671 env[1726]: 2025-09-13 00:48:01.443 [INFO][4854] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="16b289c6afddb0f7dd4b58a5712f2b29f8e636328c835cc521c6af1cfc2bbea0" Namespace="kube-system" Pod="coredns-668d6bf9bc-rwnwd" WorkloadEndpoint="ip--172--31--26--227-k8s-coredns--668d6bf9bc--rwnwd-eth0" Sep 13 00:48:03.081671 env[1726]: 2025-09-13 00:48:02.185 [INFO][4884] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="16b289c6afddb0f7dd4b58a5712f2b29f8e636328c835cc521c6af1cfc2bbea0" HandleID="k8s-pod-network.16b289c6afddb0f7dd4b58a5712f2b29f8e636328c835cc521c6af1cfc2bbea0" Workload="ip--172--31--26--227-k8s-coredns--668d6bf9bc--rwnwd-eth0" Sep 13 00:48:03.081671 env[1726]: 2025-09-13 00:48:02.196 [INFO][4884] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="16b289c6afddb0f7dd4b58a5712f2b29f8e636328c835cc521c6af1cfc2bbea0" HandleID="k8s-pod-network.16b289c6afddb0f7dd4b58a5712f2b29f8e636328c835cc521c6af1cfc2bbea0" Workload="ip--172--31--26--227-k8s-coredns--668d6bf9bc--rwnwd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002cdb70), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-26-227", "pod":"coredns-668d6bf9bc-rwnwd", "timestamp":"2025-09-13 00:48:02.166795828 +0000 UTC"}, Hostname:"ip-172-31-26-227", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:48:03.081671 env[1726]: 2025-09-13 00:48:02.197 [INFO][4884] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:48:03.081671 env[1726]: 2025-09-13 00:48:02.604 [INFO][4884] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:48:03.081671 env[1726]: 2025-09-13 00:48:02.604 [INFO][4884] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-26-227' Sep 13 00:48:03.081671 env[1726]: 2025-09-13 00:48:02.695 [INFO][4884] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.16b289c6afddb0f7dd4b58a5712f2b29f8e636328c835cc521c6af1cfc2bbea0" host="ip-172-31-26-227" Sep 13 00:48:03.081671 env[1726]: 2025-09-13 00:48:02.814 [INFO][4884] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-26-227" Sep 13 00:48:03.081671 env[1726]: 2025-09-13 00:48:02.869 [INFO][4884] ipam/ipam.go 511: Trying affinity for 192.168.43.64/26 host="ip-172-31-26-227" Sep 13 00:48:03.081671 env[1726]: 2025-09-13 00:48:02.876 [INFO][4884] ipam/ipam.go 158: Attempting to load block cidr=192.168.43.64/26 host="ip-172-31-26-227" Sep 13 00:48:03.081671 env[1726]: 2025-09-13 00:48:02.898 [INFO][4884] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.43.64/26 host="ip-172-31-26-227" Sep 13 00:48:03.081671 env[1726]: 2025-09-13 00:48:02.898 [INFO][4884] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.43.64/26 handle="k8s-pod-network.16b289c6afddb0f7dd4b58a5712f2b29f8e636328c835cc521c6af1cfc2bbea0" host="ip-172-31-26-227" Sep 13 00:48:03.081671 env[1726]: 2025-09-13 00:48:02.908 [INFO][4884] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.16b289c6afddb0f7dd4b58a5712f2b29f8e636328c835cc521c6af1cfc2bbea0 Sep 13 00:48:03.081671 env[1726]: 2025-09-13 00:48:02.925 [INFO][4884] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.43.64/26 handle="k8s-pod-network.16b289c6afddb0f7dd4b58a5712f2b29f8e636328c835cc521c6af1cfc2bbea0" host="ip-172-31-26-227" Sep 13 00:48:03.081671 env[1726]: 2025-09-13 00:48:02.947 [INFO][4884] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.43.71/26] block=192.168.43.64/26 handle="k8s-pod-network.16b289c6afddb0f7dd4b58a5712f2b29f8e636328c835cc521c6af1cfc2bbea0" host="ip-172-31-26-227" Sep 13 00:48:03.081671 env[1726]: 2025-09-13 00:48:02.947 [INFO][4884] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.43.71/26] handle="k8s-pod-network.16b289c6afddb0f7dd4b58a5712f2b29f8e636328c835cc521c6af1cfc2bbea0" host="ip-172-31-26-227" Sep 13 00:48:03.081671 env[1726]: 2025-09-13 00:48:02.947 [INFO][4884] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:48:03.081671 env[1726]: 2025-09-13 00:48:02.947 [INFO][4884] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.43.71/26] IPv6=[] ContainerID="16b289c6afddb0f7dd4b58a5712f2b29f8e636328c835cc521c6af1cfc2bbea0" HandleID="k8s-pod-network.16b289c6afddb0f7dd4b58a5712f2b29f8e636328c835cc521c6af1cfc2bbea0" Workload="ip--172--31--26--227-k8s-coredns--668d6bf9bc--rwnwd-eth0" Sep 13 00:48:03.083140 env[1726]: 2025-09-13 00:48:03.008 [INFO][4854] cni-plugin/k8s.go 418: Populated endpoint ContainerID="16b289c6afddb0f7dd4b58a5712f2b29f8e636328c835cc521c6af1cfc2bbea0" Namespace="kube-system" Pod="coredns-668d6bf9bc-rwnwd" WorkloadEndpoint="ip--172--31--26--227-k8s-coredns--668d6bf9bc--rwnwd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--227-k8s-coredns--668d6bf9bc--rwnwd-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"9c1c985e-0356-4c2e-9ae2-014973546f81", ResourceVersion:"977", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 47, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-227", ContainerID:"", Pod:"coredns-668d6bf9bc-rwnwd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.43.71/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0125d8b26a4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:48:03.083140 env[1726]: 2025-09-13 00:48:03.009 [INFO][4854] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.43.71/32] ContainerID="16b289c6afddb0f7dd4b58a5712f2b29f8e636328c835cc521c6af1cfc2bbea0" Namespace="kube-system" Pod="coredns-668d6bf9bc-rwnwd" WorkloadEndpoint="ip--172--31--26--227-k8s-coredns--668d6bf9bc--rwnwd-eth0" Sep 13 00:48:03.083140 env[1726]: 2025-09-13 00:48:03.009 [INFO][4854] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali0125d8b26a4 ContainerID="16b289c6afddb0f7dd4b58a5712f2b29f8e636328c835cc521c6af1cfc2bbea0" Namespace="kube-system" Pod="coredns-668d6bf9bc-rwnwd" WorkloadEndpoint="ip--172--31--26--227-k8s-coredns--668d6bf9bc--rwnwd-eth0" Sep 13 00:48:03.083140 env[1726]: 2025-09-13 00:48:03.035 [INFO][4854] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="16b289c6afddb0f7dd4b58a5712f2b29f8e636328c835cc521c6af1cfc2bbea0" Namespace="kube-system" Pod="coredns-668d6bf9bc-rwnwd" WorkloadEndpoint="ip--172--31--26--227-k8s-coredns--668d6bf9bc--rwnwd-eth0" Sep 13 00:48:03.083140 env[1726]: 2025-09-13 00:48:03.049 [INFO][4854] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="16b289c6afddb0f7dd4b58a5712f2b29f8e636328c835cc521c6af1cfc2bbea0" Namespace="kube-system" Pod="coredns-668d6bf9bc-rwnwd" WorkloadEndpoint="ip--172--31--26--227-k8s-coredns--668d6bf9bc--rwnwd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--227-k8s-coredns--668d6bf9bc--rwnwd-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"9c1c985e-0356-4c2e-9ae2-014973546f81", ResourceVersion:"977", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 47, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-227", ContainerID:"16b289c6afddb0f7dd4b58a5712f2b29f8e636328c835cc521c6af1cfc2bbea0", Pod:"coredns-668d6bf9bc-rwnwd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.43.71/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0125d8b26a4", MAC:"ea:b0:77:9f:e4:53", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:48:03.083140 env[1726]: 2025-09-13 00:48:03.078 [INFO][4854] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="16b289c6afddb0f7dd4b58a5712f2b29f8e636328c835cc521c6af1cfc2bbea0" Namespace="kube-system" Pod="coredns-668d6bf9bc-rwnwd" WorkloadEndpoint="ip--172--31--26--227-k8s-coredns--668d6bf9bc--rwnwd-eth0" Sep 13 00:48:03.154058 systemd[1]: Started cri-containerd-9870e5e3afcdef073f5cd2d7b0aca7ef5ad2fa927f01b068251c11360409e173.scope. Sep 13 00:48:03.246227 env[1726]: time="2025-09-13T00:48:03.246142408Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:48:03.247517 env[1726]: time="2025-09-13T00:48:03.246424366Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:48:03.247517 env[1726]: time="2025-09-13T00:48:03.246477420Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:48:03.248441 env[1726]: time="2025-09-13T00:48:03.247841303Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/16b289c6afddb0f7dd4b58a5712f2b29f8e636328c835cc521c6af1cfc2bbea0 pid=5034 runtime=io.containerd.runc.v2 Sep 13 00:48:03.255207 systemd-networkd[1456]: cali1500d249cae: Gained IPv6LL Sep 13 00:48:03.331715 env[1726]: time="2025-09-13T00:48:03.331445395Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75d655b7b-65mmj,Uid:3c832220-40d0-406a-bbd8-8df3c514c55e,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"d5b033a9f41ca9b9e35620f43a5cf0e836b873c77c5b0bf707d859712fd7ea36\"" Sep 13 00:48:03.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.332000 audit: BPF prog-id=196 op=LOAD Sep 13 00:48:03.333000 audit[4992]: AVC avc: denied { bpf } for pid=4992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.333000 audit[4992]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4978 pid=4992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:03.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938373065356533616663646566303733663563643264376230616361 Sep 13 00:48:03.333000 audit[4992]: AVC avc: denied { perfmon } for pid=4992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.333000 audit[4992]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4978 pid=4992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:03.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938373065356533616663646566303733663563643264376230616361 Sep 13 00:48:03.333000 audit[4992]: AVC avc: denied { bpf } for pid=4992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.333000 audit[4992]: AVC avc: denied { bpf } for pid=4992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.333000 audit[4992]: AVC avc: denied { bpf } for pid=4992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.333000 audit[4992]: AVC avc: denied { perfmon } for pid=4992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.333000 audit[4992]: AVC avc: denied { perfmon } for pid=4992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.333000 audit[4992]: AVC avc: denied { perfmon } for pid=4992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.333000 audit[4992]: AVC avc: denied { perfmon } for pid=4992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.333000 audit[4992]: AVC avc: denied { perfmon } for pid=4992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.333000 audit[4992]: AVC avc: denied { bpf } for pid=4992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.333000 audit[4992]: AVC avc: denied { bpf } for pid=4992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.333000 audit: BPF prog-id=197 op=LOAD Sep 13 00:48:03.333000 audit[4992]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00028a3a0 items=0 ppid=4978 pid=4992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:03.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938373065356533616663646566303733663563643264376230616361 Sep 13 00:48:03.334000 audit[4992]: AVC avc: denied { bpf } for pid=4992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.334000 audit[4992]: AVC avc: denied { bpf } for pid=4992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.334000 audit[4992]: AVC avc: denied { perfmon } for pid=4992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.334000 audit[4992]: AVC avc: denied { perfmon } for pid=4992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.334000 audit[4992]: AVC avc: denied { perfmon } for pid=4992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.334000 audit[4992]: AVC avc: denied { perfmon } for pid=4992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.334000 audit[4992]: AVC avc: denied { perfmon } for pid=4992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.334000 audit[4992]: AVC avc: denied { bpf } for pid=4992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.334000 audit[4992]: AVC avc: denied { bpf } for pid=4992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.334000 audit: BPF prog-id=198 op=LOAD Sep 13 00:48:03.334000 audit[4992]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00028a3e8 items=0 ppid=4978 pid=4992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:03.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938373065356533616663646566303733663563643264376230616361 Sep 13 00:48:03.334000 audit: BPF prog-id=198 op=UNLOAD Sep 13 00:48:03.334000 audit: BPF prog-id=197 op=UNLOAD Sep 13 00:48:03.334000 audit[4992]: AVC avc: denied { bpf } for pid=4992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.334000 audit[4992]: AVC avc: denied { bpf } for pid=4992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.334000 audit[4992]: AVC avc: denied { bpf } for pid=4992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.334000 audit[4992]: AVC avc: denied { perfmon } for pid=4992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.334000 audit[4992]: AVC avc: denied { perfmon } for pid=4992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.334000 audit[4992]: AVC avc: denied { perfmon } for pid=4992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.334000 audit[4992]: AVC avc: denied { perfmon } for pid=4992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.334000 audit[4992]: AVC avc: denied { perfmon } for pid=4992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.334000 audit[4992]: AVC avc: denied { bpf } for pid=4992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.334000 audit[4992]: AVC avc: denied { bpf } for pid=4992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.334000 audit: BPF prog-id=199 op=LOAD Sep 13 00:48:03.334000 audit[4992]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00028a7f8 items=0 ppid=4978 pid=4992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:03.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938373065356533616663646566303733663563643264376230616361 Sep 13 00:48:03.373000 audit[5056]: NETFILTER_CFG table=filter:111 family=2 entries=85 op=nft_register_chain pid=5056 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:48:03.400358 systemd[1]: Started cri-containerd-16b289c6afddb0f7dd4b58a5712f2b29f8e636328c835cc521c6af1cfc2bbea0.scope. Sep 13 00:48:03.410461 sshd[4707]: Connection closed by authenticating user root 101.126.10.196 port 46274 [preauth] Sep 13 00:48:03.415000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.26.227:22-101.126.10.196:46274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:03.416180 systemd[1]: sshd@7-172.31.26.227:22-101.126.10.196:46274.service: Deactivated successfully. Sep 13 00:48:03.373000 audit[5056]: SYSCALL arch=c000003e syscall=46 success=yes exit=47732 a0=3 a1=7ffe708f6c10 a2=0 a3=7ffe708f6bfc items=0 ppid=4141 pid=5056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:03.373000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:48:03.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.462000 audit: BPF prog-id=200 op=LOAD Sep 13 00:48:03.463000 audit[5048]: AVC avc: denied { bpf } for pid=5048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.463000 audit[5048]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000199c48 a2=10 a3=1c items=0 ppid=5034 pid=5048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:03.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136623238396336616664646230663764643462353861353731326632 Sep 13 00:48:03.463000 audit[5048]: AVC avc: denied { perfmon } for pid=5048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.463000 audit[5048]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001996b0 a2=3c a3=c items=0 ppid=5034 pid=5048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:03.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136623238396336616664646230663764643462353861353731326632 Sep 13 00:48:03.466000 audit[5048]: AVC avc: denied { bpf } for pid=5048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.466000 audit[5048]: AVC avc: denied { bpf } for pid=5048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.466000 audit[5048]: AVC avc: denied { bpf } for pid=5048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.466000 audit[5048]: AVC avc: denied { perfmon } for pid=5048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.466000 audit[5048]: AVC avc: denied { perfmon } for pid=5048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.466000 audit[5048]: AVC avc: denied { perfmon } for pid=5048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.466000 audit[5048]: AVC avc: denied { perfmon } for pid=5048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.466000 audit[5048]: AVC avc: denied { perfmon } for pid=5048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.466000 audit[5048]: AVC avc: denied { bpf } for pid=5048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.466000 audit[5048]: AVC avc: denied { bpf } for pid=5048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.466000 audit: BPF prog-id=201 op=LOAD Sep 13 00:48:03.466000 audit[5048]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001999d8 a2=78 a3=c000218c30 items=0 ppid=5034 pid=5048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:03.466000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136623238396336616664646230663764643462353861353731326632 Sep 13 00:48:03.466000 audit[5048]: AVC avc: denied { bpf } for pid=5048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.466000 audit[5048]: AVC avc: denied { bpf } for pid=5048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.466000 audit[5048]: AVC avc: denied { perfmon } for pid=5048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.466000 audit[5048]: AVC avc: denied { perfmon } for pid=5048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.466000 audit[5048]: AVC avc: denied { perfmon } for pid=5048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.466000 audit[5048]: AVC avc: denied { perfmon } for pid=5048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.466000 audit[5048]: AVC avc: denied { perfmon } for pid=5048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.466000 audit[5048]: AVC avc: denied { bpf } for pid=5048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.466000 audit[5048]: AVC avc: denied { bpf } for pid=5048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.466000 audit: BPF prog-id=202 op=LOAD Sep 13 00:48:03.466000 audit[5048]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000199770 a2=78 a3=c000218c78 items=0 ppid=5034 pid=5048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:03.466000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136623238396336616664646230663764643462353861353731326632 Sep 13 00:48:03.466000 audit: BPF prog-id=202 op=UNLOAD Sep 13 00:48:03.466000 audit: BPF prog-id=201 op=UNLOAD Sep 13 00:48:03.466000 audit[5048]: AVC avc: denied { bpf } for pid=5048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.466000 audit[5048]: AVC avc: denied { bpf } for pid=5048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.466000 audit[5048]: AVC avc: denied { bpf } for pid=5048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.466000 audit[5048]: AVC avc: denied { perfmon } for pid=5048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.466000 audit[5048]: AVC avc: denied { perfmon } for pid=5048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.466000 audit[5048]: AVC avc: denied { perfmon } for pid=5048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.466000 audit[5048]: AVC avc: denied { perfmon } for pid=5048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.466000 audit[5048]: AVC avc: denied { perfmon } for pid=5048 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.466000 audit[5048]: AVC avc: denied { bpf } for pid=5048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.466000 audit[5048]: AVC avc: denied { bpf } for pid=5048 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.466000 audit: BPF prog-id=203 op=LOAD Sep 13 00:48:03.466000 audit[5048]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000199c30 a2=78 a3=c000219088 items=0 ppid=5034 pid=5048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:03.466000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136623238396336616664646230663764643462353861353731326632 Sep 13 00:48:03.601000 audit[4733]: AVC avc: denied { getattr } for pid=4733 comm="coredns" path="cgroup:[4026532718]" dev="nsfs" ino=4026532718 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c493 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 Sep 13 00:48:03.601000 audit[4733]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005a828 a2=c000128fa8 a3=0 items=0 ppid=4676 pid=4733 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c186,c493 key=(null) Sep 13 00:48:03.601000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 Sep 13 00:48:03.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.26.227:22-101.126.10.196:46282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:03.610031 systemd[1]: Started sshd@8-172.31.26.227:22-101.126.10.196:46282.service. Sep 13 00:48:03.671700 env[1726]: time="2025-09-13T00:48:03.669516285Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-54d579b49d-krd8k,Uid:908b4e5f-addd-4d5c-a146-1b9da1f1b4f4,Namespace:calico-system,Attempt:1,} returns sandbox id \"9870e5e3afcdef073f5cd2d7b0aca7ef5ad2fa927f01b068251c11360409e173\"" Sep 13 00:48:03.683000 audit[5103]: NETFILTER_CFG table=filter:112 family=2 entries=52 op=nft_register_chain pid=5103 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:48:03.683000 audit[5103]: SYSCALL arch=c000003e syscall=46 success=yes exit=23908 a0=3 a1=7ffecae14ee0 a2=0 a3=7ffecae14ecc items=0 ppid=4141 pid=5103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:03.683000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:48:03.691655 env[1726]: time="2025-09-13T00:48:03.691584439Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-rwnwd,Uid:9c1c985e-0356-4c2e-9ae2-014973546f81,Namespace:kube-system,Attempt:1,} returns sandbox id \"16b289c6afddb0f7dd4b58a5712f2b29f8e636328c835cc521c6af1cfc2bbea0\"" Sep 13 00:48:03.695707 env[1726]: time="2025-09-13T00:48:03.695654828Z" level=info msg="CreateContainer within sandbox \"16b289c6afddb0f7dd4b58a5712f2b29f8e636328c835cc521c6af1cfc2bbea0\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Sep 13 00:48:03.727225 systemd-networkd[1456]: calia40a73b1983: Link UP Sep 13 00:48:03.730430 systemd-networkd[1456]: calia40a73b1983: Gained carrier Sep 13 00:48:03.730673 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia40a73b1983: link becomes ready Sep 13 00:48:03.746750 env[1726]: time="2025-09-13T00:48:03.746694265Z" level=info msg="CreateContainer within sandbox \"16b289c6afddb0f7dd4b58a5712f2b29f8e636328c835cc521c6af1cfc2bbea0\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"88b0359828a9b648d32f3aee5318b5029fc25c2ca6137d66b2dbcda67a106929\"" Sep 13 00:48:03.747678 env[1726]: time="2025-09-13T00:48:03.747643771Z" level=info msg="StartContainer for \"88b0359828a9b648d32f3aee5318b5029fc25c2ca6137d66b2dbcda67a106929\"" Sep 13 00:48:03.809657 env[1726]: 2025-09-13 00:48:03.386 [INFO][4997] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--26--227-k8s-csi--node--driver--gqprd-eth0 csi-node-driver- calico-system a9acc916-f8c5-498e-a936-eb42d96a2962 991 0 2025-09-13 00:47:33 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:6c96d95cc7 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ip-172-31-26-227 csi-node-driver-gqprd eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calia40a73b1983 [] [] }} ContainerID="d7227799eb3874307dfa9e5f46475ab3e4ec2f861c995e1b0f1d12f4e9434540" Namespace="calico-system" Pod="csi-node-driver-gqprd" WorkloadEndpoint="ip--172--31--26--227-k8s-csi--node--driver--gqprd-" Sep 13 00:48:03.809657 env[1726]: 2025-09-13 00:48:03.386 [INFO][4997] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="d7227799eb3874307dfa9e5f46475ab3e4ec2f861c995e1b0f1d12f4e9434540" Namespace="calico-system" Pod="csi-node-driver-gqprd" WorkloadEndpoint="ip--172--31--26--227-k8s-csi--node--driver--gqprd-eth0" Sep 13 00:48:03.809657 env[1726]: 2025-09-13 00:48:03.520 [INFO][5063] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d7227799eb3874307dfa9e5f46475ab3e4ec2f861c995e1b0f1d12f4e9434540" HandleID="k8s-pod-network.d7227799eb3874307dfa9e5f46475ab3e4ec2f861c995e1b0f1d12f4e9434540" Workload="ip--172--31--26--227-k8s-csi--node--driver--gqprd-eth0" Sep 13 00:48:03.809657 env[1726]: 2025-09-13 00:48:03.523 [INFO][5063] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d7227799eb3874307dfa9e5f46475ab3e4ec2f861c995e1b0f1d12f4e9434540" HandleID="k8s-pod-network.d7227799eb3874307dfa9e5f46475ab3e4ec2f861c995e1b0f1d12f4e9434540" Workload="ip--172--31--26--227-k8s-csi--node--driver--gqprd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002df650), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-26-227", "pod":"csi-node-driver-gqprd", "timestamp":"2025-09-13 00:48:03.520772943 +0000 UTC"}, Hostname:"ip-172-31-26-227", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:48:03.809657 env[1726]: 2025-09-13 00:48:03.524 [INFO][5063] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:48:03.809657 env[1726]: 2025-09-13 00:48:03.524 [INFO][5063] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:48:03.809657 env[1726]: 2025-09-13 00:48:03.524 [INFO][5063] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-26-227' Sep 13 00:48:03.809657 env[1726]: 2025-09-13 00:48:03.536 [INFO][5063] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.d7227799eb3874307dfa9e5f46475ab3e4ec2f861c995e1b0f1d12f4e9434540" host="ip-172-31-26-227" Sep 13 00:48:03.809657 env[1726]: 2025-09-13 00:48:03.582 [INFO][5063] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-26-227" Sep 13 00:48:03.809657 env[1726]: 2025-09-13 00:48:03.595 [INFO][5063] ipam/ipam.go 511: Trying affinity for 192.168.43.64/26 host="ip-172-31-26-227" Sep 13 00:48:03.809657 env[1726]: 2025-09-13 00:48:03.604 [INFO][5063] ipam/ipam.go 158: Attempting to load block cidr=192.168.43.64/26 host="ip-172-31-26-227" Sep 13 00:48:03.809657 env[1726]: 2025-09-13 00:48:03.615 [INFO][5063] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.43.64/26 host="ip-172-31-26-227" Sep 13 00:48:03.809657 env[1726]: 2025-09-13 00:48:03.615 [INFO][5063] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.43.64/26 handle="k8s-pod-network.d7227799eb3874307dfa9e5f46475ab3e4ec2f861c995e1b0f1d12f4e9434540" host="ip-172-31-26-227" Sep 13 00:48:03.809657 env[1726]: 2025-09-13 00:48:03.618 [INFO][5063] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.d7227799eb3874307dfa9e5f46475ab3e4ec2f861c995e1b0f1d12f4e9434540 Sep 13 00:48:03.809657 env[1726]: 2025-09-13 00:48:03.641 [INFO][5063] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.43.64/26 handle="k8s-pod-network.d7227799eb3874307dfa9e5f46475ab3e4ec2f861c995e1b0f1d12f4e9434540" host="ip-172-31-26-227" Sep 13 00:48:03.809657 env[1726]: 2025-09-13 00:48:03.706 [INFO][5063] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.43.72/26] block=192.168.43.64/26 handle="k8s-pod-network.d7227799eb3874307dfa9e5f46475ab3e4ec2f861c995e1b0f1d12f4e9434540" host="ip-172-31-26-227" Sep 13 00:48:03.809657 env[1726]: 2025-09-13 00:48:03.710 [INFO][5063] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.43.72/26] handle="k8s-pod-network.d7227799eb3874307dfa9e5f46475ab3e4ec2f861c995e1b0f1d12f4e9434540" host="ip-172-31-26-227" Sep 13 00:48:03.809657 env[1726]: 2025-09-13 00:48:03.710 [INFO][5063] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:48:03.809657 env[1726]: 2025-09-13 00:48:03.710 [INFO][5063] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.43.72/26] IPv6=[] ContainerID="d7227799eb3874307dfa9e5f46475ab3e4ec2f861c995e1b0f1d12f4e9434540" HandleID="k8s-pod-network.d7227799eb3874307dfa9e5f46475ab3e4ec2f861c995e1b0f1d12f4e9434540" Workload="ip--172--31--26--227-k8s-csi--node--driver--gqprd-eth0" Sep 13 00:48:03.811328 env[1726]: 2025-09-13 00:48:03.714 [INFO][4997] cni-plugin/k8s.go 418: Populated endpoint ContainerID="d7227799eb3874307dfa9e5f46475ab3e4ec2f861c995e1b0f1d12f4e9434540" Namespace="calico-system" Pod="csi-node-driver-gqprd" WorkloadEndpoint="ip--172--31--26--227-k8s-csi--node--driver--gqprd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--227-k8s-csi--node--driver--gqprd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a9acc916-f8c5-498e-a936-eb42d96a2962", ResourceVersion:"991", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 47, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-227", ContainerID:"", Pod:"csi-node-driver-gqprd", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.43.72/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calia40a73b1983", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:48:03.811328 env[1726]: 2025-09-13 00:48:03.714 [INFO][4997] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.43.72/32] ContainerID="d7227799eb3874307dfa9e5f46475ab3e4ec2f861c995e1b0f1d12f4e9434540" Namespace="calico-system" Pod="csi-node-driver-gqprd" WorkloadEndpoint="ip--172--31--26--227-k8s-csi--node--driver--gqprd-eth0" Sep 13 00:48:03.811328 env[1726]: 2025-09-13 00:48:03.714 [INFO][4997] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia40a73b1983 ContainerID="d7227799eb3874307dfa9e5f46475ab3e4ec2f861c995e1b0f1d12f4e9434540" Namespace="calico-system" Pod="csi-node-driver-gqprd" WorkloadEndpoint="ip--172--31--26--227-k8s-csi--node--driver--gqprd-eth0" Sep 13 00:48:03.811328 env[1726]: 2025-09-13 00:48:03.732 [INFO][4997] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d7227799eb3874307dfa9e5f46475ab3e4ec2f861c995e1b0f1d12f4e9434540" Namespace="calico-system" Pod="csi-node-driver-gqprd" WorkloadEndpoint="ip--172--31--26--227-k8s-csi--node--driver--gqprd-eth0" Sep 13 00:48:03.811328 env[1726]: 2025-09-13 00:48:03.740 [INFO][4997] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="d7227799eb3874307dfa9e5f46475ab3e4ec2f861c995e1b0f1d12f4e9434540" Namespace="calico-system" Pod="csi-node-driver-gqprd" WorkloadEndpoint="ip--172--31--26--227-k8s-csi--node--driver--gqprd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--227-k8s-csi--node--driver--gqprd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a9acc916-f8c5-498e-a936-eb42d96a2962", ResourceVersion:"991", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 47, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-227", ContainerID:"d7227799eb3874307dfa9e5f46475ab3e4ec2f861c995e1b0f1d12f4e9434540", Pod:"csi-node-driver-gqprd", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.43.72/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calia40a73b1983", MAC:"d6:16:fc:d0:55:e4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:48:03.811328 env[1726]: 2025-09-13 00:48:03.788 [INFO][4997] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="d7227799eb3874307dfa9e5f46475ab3e4ec2f861c995e1b0f1d12f4e9434540" Namespace="calico-system" Pod="csi-node-driver-gqprd" WorkloadEndpoint="ip--172--31--26--227-k8s-csi--node--driver--gqprd-eth0" Sep 13 00:48:03.881324 systemd[1]: Started cri-containerd-88b0359828a9b648d32f3aee5318b5029fc25c2ca6137d66b2dbcda67a106929.scope. Sep 13 00:48:03.893472 env[1726]: time="2025-09-13T00:48:03.893348264Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:48:03.893472 env[1726]: time="2025-09-13T00:48:03.893425142Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:48:03.894075 env[1726]: time="2025-09-13T00:48:03.893439851Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:48:03.897210 env[1726]: time="2025-09-13T00:48:03.897135317Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d7227799eb3874307dfa9e5f46475ab3e4ec2f861c995e1b0f1d12f4e9434540 pid=5152 runtime=io.containerd.runc.v2 Sep 13 00:48:03.883000 audit[5145]: NETFILTER_CFG table=filter:113 family=2 entries=60 op=nft_register_chain pid=5145 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:48:03.883000 audit[5145]: SYSCALL arch=c000003e syscall=46 success=yes exit=26704 a0=3 a1=7fffcc94eb80 a2=0 a3=7fffcc94eb6c items=0 ppid=4141 pid=5145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:03.883000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:48:03.928448 systemd[1]: Started cri-containerd-d7227799eb3874307dfa9e5f46475ab3e4ec2f861c995e1b0f1d12f4e9434540.scope. Sep 13 00:48:03.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.942000 audit: BPF prog-id=204 op=LOAD Sep 13 00:48:03.943000 audit[5131]: AVC avc: denied { bpf } for pid=5131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.943000 audit[5131]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=5034 pid=5131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:03.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838623033353938323861396236343864333266336165653533313862 Sep 13 00:48:03.943000 audit[5131]: AVC avc: denied { perfmon } for pid=5131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.943000 audit[5131]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=5034 pid=5131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:03.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838623033353938323861396236343864333266336165653533313862 Sep 13 00:48:03.943000 audit[5131]: AVC avc: denied { bpf } for pid=5131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.943000 audit[5131]: AVC avc: denied { bpf } for pid=5131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.943000 audit[5131]: AVC avc: denied { bpf } for pid=5131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.943000 audit[5131]: AVC avc: denied { perfmon } for pid=5131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.943000 audit[5131]: AVC avc: denied { perfmon } for pid=5131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.943000 audit[5131]: AVC avc: denied { perfmon } for pid=5131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.943000 audit[5131]: AVC avc: denied { perfmon } for pid=5131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.943000 audit[5131]: AVC avc: denied { perfmon } for pid=5131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.943000 audit[5131]: AVC avc: denied { bpf } for pid=5131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.943000 audit[5131]: AVC avc: denied { bpf } for pid=5131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.943000 audit: BPF prog-id=205 op=LOAD Sep 13 00:48:03.943000 audit[5131]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001915c0 items=0 ppid=5034 pid=5131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:03.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838623033353938323861396236343864333266336165653533313862 Sep 13 00:48:03.943000 audit[5131]: AVC avc: denied { bpf } for pid=5131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.943000 audit[5131]: AVC avc: denied { bpf } for pid=5131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.943000 audit[5131]: AVC avc: denied { perfmon } for pid=5131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.943000 audit[5131]: AVC avc: denied { perfmon } for pid=5131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.943000 audit[5131]: AVC avc: denied { perfmon } for pid=5131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.943000 audit[5131]: AVC avc: denied { perfmon } for pid=5131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.943000 audit[5131]: AVC avc: denied { perfmon } for pid=5131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.943000 audit[5131]: AVC avc: denied { bpf } for pid=5131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.943000 audit[5131]: AVC avc: denied { bpf } for pid=5131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.943000 audit: BPF prog-id=206 op=LOAD Sep 13 00:48:03.943000 audit[5131]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000191608 items=0 ppid=5034 pid=5131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:03.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838623033353938323861396236343864333266336165653533313862 Sep 13 00:48:03.943000 audit: BPF prog-id=206 op=UNLOAD Sep 13 00:48:03.943000 audit: BPF prog-id=205 op=UNLOAD Sep 13 00:48:03.943000 audit[5131]: AVC avc: denied { bpf } for pid=5131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.943000 audit[5131]: AVC avc: denied { bpf } for pid=5131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.943000 audit[5131]: AVC avc: denied { bpf } for pid=5131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.943000 audit[5131]: AVC avc: denied { perfmon } for pid=5131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.943000 audit[5131]: AVC avc: denied { perfmon } for pid=5131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.943000 audit[5131]: AVC avc: denied { perfmon } for pid=5131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.943000 audit[5131]: AVC avc: denied { perfmon } for pid=5131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.943000 audit[5131]: AVC avc: denied { perfmon } for pid=5131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.943000 audit[5131]: AVC avc: denied { bpf } for pid=5131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.943000 audit[5131]: AVC avc: denied { bpf } for pid=5131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:03.943000 audit: BPF prog-id=207 op=LOAD Sep 13 00:48:03.943000 audit[5131]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000191a18 items=0 ppid=5034 pid=5131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:03.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838623033353938323861396236343864333266336165653533313862 Sep 13 00:48:03.979866 env[1726]: time="2025-09-13T00:48:03.979808718Z" level=info msg="StartContainer for \"88b0359828a9b648d32f3aee5318b5029fc25c2ca6137d66b2dbcda67a106929\" returns successfully" Sep 13 00:48:04.048000 audit[5165]: AVC avc: denied { getattr } for pid=5165 comm="coredns" path="cgroup:[4026532741]" dev="nsfs" ino=4026532741 scontext=system_u:system_r:svirt_lxc_net_t:s0:c328,c999 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 Sep 13 00:48:04.048000 audit[5165]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c000058a38 a2=c0000c4d38 a3=0 items=0 ppid=5034 pid=5165 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c328,c999 key=(null) Sep 13 00:48:04.048000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 Sep 13 00:48:04.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:04.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:04.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:04.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:04.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:04.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:04.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:04.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:04.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:04.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:04.143000 audit: BPF prog-id=208 op=LOAD Sep 13 00:48:04.143000 audit[5166]: AVC avc: denied { bpf } for pid=5166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:04.143000 audit[5166]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=5152 pid=5166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:04.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437323237373939656233383734333037646661396535663436343735 Sep 13 00:48:04.143000 audit[5166]: AVC avc: denied { perfmon } for pid=5166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:04.143000 audit[5166]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=5152 pid=5166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:04.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437323237373939656233383734333037646661396535663436343735 Sep 13 00:48:04.144000 audit[5166]: AVC avc: denied { bpf } for pid=5166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:04.144000 audit[5166]: AVC avc: denied { bpf } for pid=5166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:04.144000 audit[5166]: AVC avc: denied { bpf } for pid=5166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:04.144000 audit[5166]: AVC avc: denied { perfmon } for pid=5166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:04.144000 audit[5166]: AVC avc: denied { perfmon } for pid=5166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:04.144000 audit[5166]: AVC avc: denied { perfmon } for pid=5166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:04.144000 audit[5166]: AVC avc: denied { perfmon } for pid=5166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:04.144000 audit[5166]: AVC avc: denied { perfmon } for pid=5166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:04.144000 audit[5166]: AVC avc: denied { bpf } for pid=5166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:04.144000 audit[5166]: AVC avc: denied { bpf } for pid=5166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:04.144000 audit: BPF prog-id=209 op=LOAD Sep 13 00:48:04.144000 audit[5166]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003b69d0 items=0 ppid=5152 pid=5166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:04.144000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437323237373939656233383734333037646661396535663436343735 Sep 13 00:48:04.144000 audit[5166]: AVC avc: denied { bpf } for pid=5166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:04.144000 audit[5166]: AVC avc: denied { bpf } for pid=5166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:04.144000 audit[5166]: AVC avc: denied { perfmon } for pid=5166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:04.144000 audit[5166]: AVC avc: denied { perfmon } for pid=5166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:04.144000 audit[5166]: AVC avc: denied { perfmon } for pid=5166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:04.144000 audit[5166]: AVC avc: denied { perfmon } for pid=5166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:04.144000 audit[5166]: AVC avc: denied { perfmon } for pid=5166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:04.144000 audit[5166]: AVC avc: denied { bpf } for pid=5166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:04.144000 audit[5166]: AVC avc: denied { bpf } for pid=5166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:04.144000 audit: BPF prog-id=210 op=LOAD Sep 13 00:48:04.144000 audit[5166]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003b6a18 items=0 ppid=5152 pid=5166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:04.144000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437323237373939656233383734333037646661396535663436343735 Sep 13 00:48:04.144000 audit: BPF prog-id=210 op=UNLOAD Sep 13 00:48:04.144000 audit: BPF prog-id=209 op=UNLOAD Sep 13 00:48:04.144000 audit[5166]: AVC avc: denied { bpf } for pid=5166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:04.144000 audit[5166]: AVC avc: denied { bpf } for pid=5166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:04.144000 audit[5166]: AVC avc: denied { bpf } for pid=5166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:04.144000 audit[5166]: AVC avc: denied { perfmon } for pid=5166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:04.144000 audit[5166]: AVC avc: denied { perfmon } for pid=5166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:04.144000 audit[5166]: AVC avc: denied { perfmon } for pid=5166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:04.144000 audit[5166]: AVC avc: denied { perfmon } for pid=5166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:04.144000 audit[5166]: AVC avc: denied { perfmon } for pid=5166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:04.144000 audit[5166]: AVC avc: denied { bpf } for pid=5166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:04.144000 audit[5166]: AVC avc: denied { bpf } for pid=5166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:04.144000 audit: BPF prog-id=211 op=LOAD Sep 13 00:48:04.144000 audit[5166]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003b6e28 items=0 ppid=5152 pid=5166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:04.144000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437323237373939656233383734333037646661396535663436343735 Sep 13 00:48:04.204000 audit[5205]: NETFILTER_CFG table=filter:114 family=2 entries=20 op=nft_register_rule pid=5205 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:48:04.204000 audit[5205]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffe3f32c980 a2=0 a3=7ffe3f32c96c items=0 ppid=2978 pid=5205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:04.204000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:48:04.208000 audit[5205]: NETFILTER_CFG table=nat:115 family=2 entries=14 op=nft_register_rule pid=5205 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:48:04.208000 audit[5205]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffe3f32c980 a2=0 a3=0 items=0 ppid=2978 pid=5205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:04.208000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:48:04.237490 env[1726]: time="2025-09-13T00:48:04.237445026Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-gqprd,Uid:a9acc916-f8c5-498e-a936-eb42d96a2962,Namespace:calico-system,Attempt:1,} returns sandbox id \"d7227799eb3874307dfa9e5f46475ab3e4ec2f861c995e1b0f1d12f4e9434540\"" Sep 13 00:48:04.279017 systemd-networkd[1456]: cali71d91ac77ec: Gained IPv6LL Sep 13 00:48:04.624121 sshd[5101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.126.10.196 user=root Sep 13 00:48:04.623000 audit[5101]: USER_AUTH pid=5101 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.126.10.196 addr=101.126.10.196 terminal=ssh res=failed' Sep 13 00:48:04.981777 systemd-networkd[1456]: calia40a73b1983: Gained IPv6LL Sep 13 00:48:05.045780 systemd-networkd[1456]: cali0125d8b26a4: Gained IPv6LL Sep 13 00:48:05.090793 env[1726]: time="2025-09-13T00:48:05.090594452Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:05.096880 kubelet[2611]: I0913 00:48:05.096800 2611 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-rwnwd" podStartSLOduration=48.096753584 podStartE2EDuration="48.096753584s" podCreationTimestamp="2025-09-13 00:47:17 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-13 00:48:04.097158615 +0000 UTC m=+51.786272618" watchObservedRunningTime="2025-09-13 00:48:05.096753584 +0000 UTC m=+52.785867587" Sep 13 00:48:05.144000 audit[5214]: NETFILTER_CFG table=filter:116 family=2 entries=17 op=nft_register_rule pid=5214 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:48:05.144000 audit[5214]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffc0699cab0 a2=0 a3=7ffc0699ca9c items=0 ppid=2978 pid=5214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:05.144000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:48:05.156000 audit[5214]: NETFILTER_CFG table=nat:117 family=2 entries=35 op=nft_register_chain pid=5214 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:48:05.157812 env[1726]: time="2025-09-13T00:48:05.157751523Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:879f2443aed0573271114108bfec35d3e76419f98282ef796c646d0986c5ba6a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:05.156000 audit[5214]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffc0699cab0 a2=0 a3=7ffc0699ca9c items=0 ppid=2978 pid=5214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:05.156000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:48:05.161986 env[1726]: time="2025-09-13T00:48:05.161928622Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:05.166139 env[1726]: time="2025-09-13T00:48:05.166071213Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:6a24147f11c1edce9d6ba79bdb0c2beadec53853fb43438a287291e67b41e51b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:05.166969 env[1726]: time="2025-09-13T00:48:05.166916614Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.3\" returns image reference \"sha256:879f2443aed0573271114108bfec35d3e76419f98282ef796c646d0986c5ba6a\"" Sep 13 00:48:05.170425 env[1726]: time="2025-09-13T00:48:05.170388084Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.3\"" Sep 13 00:48:05.175136 env[1726]: time="2025-09-13T00:48:05.175087096Z" level=info msg="CreateContainer within sandbox \"c1c488c5db2d36aa6721803e4822b9c4777c4a78b7bb4679bbe3fe82d2a5b7f6\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Sep 13 00:48:05.207349 env[1726]: time="2025-09-13T00:48:05.207296897Z" level=info msg="CreateContainer within sandbox \"c1c488c5db2d36aa6721803e4822b9c4777c4a78b7bb4679bbe3fe82d2a5b7f6\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"2dcab2b737f128f436ce4270702634b388ca241c96367299e10c32318a0deb6d\"" Sep 13 00:48:05.211525 env[1726]: time="2025-09-13T00:48:05.211484307Z" level=info msg="StartContainer for \"2dcab2b737f128f436ce4270702634b388ca241c96367299e10c32318a0deb6d\"" Sep 13 00:48:05.270425 systemd[1]: Started cri-containerd-2dcab2b737f128f436ce4270702634b388ca241c96367299e10c32318a0deb6d.scope. Sep 13 00:48:05.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:05.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:05.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:05.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:05.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:05.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:05.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:05.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:05.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:05.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:05.320000 audit: BPF prog-id=212 op=LOAD Sep 13 00:48:05.322000 audit[5224]: AVC avc: denied { bpf } for pid=5224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:05.322000 audit[5224]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=4498 pid=5224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:05.322000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264636162326237333766313238663433366365343237303730323633 Sep 13 00:48:05.322000 audit[5224]: AVC avc: denied { perfmon } for pid=5224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:05.322000 audit[5224]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=4498 pid=5224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:05.322000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264636162326237333766313238663433366365343237303730323633 Sep 13 00:48:05.322000 audit[5224]: AVC avc: denied { bpf } for pid=5224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:05.322000 audit[5224]: AVC avc: denied { bpf } for pid=5224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:05.322000 audit[5224]: AVC avc: denied { bpf } for pid=5224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:05.322000 audit[5224]: AVC avc: denied { perfmon } for pid=5224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:05.322000 audit[5224]: AVC avc: denied { perfmon } for pid=5224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:05.322000 audit[5224]: AVC avc: denied { perfmon } for pid=5224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:05.322000 audit[5224]: AVC avc: denied { perfmon } for pid=5224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:05.322000 audit[5224]: AVC avc: denied { perfmon } for pid=5224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:05.322000 audit[5224]: AVC avc: denied { bpf } for pid=5224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:05.322000 audit[5224]: AVC avc: denied { bpf } for pid=5224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:05.322000 audit: BPF prog-id=213 op=LOAD Sep 13 00:48:05.322000 audit[5224]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000025730 items=0 ppid=4498 pid=5224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:05.322000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264636162326237333766313238663433366365343237303730323633 Sep 13 00:48:05.323000 audit[5224]: AVC avc: denied { bpf } for pid=5224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:05.323000 audit[5224]: AVC avc: denied { bpf } for pid=5224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:05.323000 audit[5224]: AVC avc: denied { perfmon } for pid=5224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:05.323000 audit[5224]: AVC avc: denied { perfmon } for pid=5224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:05.323000 audit[5224]: AVC avc: denied { perfmon } for pid=5224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:05.323000 audit[5224]: AVC avc: denied { perfmon } for pid=5224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:05.323000 audit[5224]: AVC avc: denied { perfmon } for pid=5224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:05.323000 audit[5224]: AVC avc: denied { bpf } for pid=5224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:05.323000 audit[5224]: AVC avc: denied { bpf } for pid=5224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:05.323000 audit: BPF prog-id=214 op=LOAD Sep 13 00:48:05.323000 audit[5224]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c000025778 items=0 ppid=4498 pid=5224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:05.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264636162326237333766313238663433366365343237303730323633 Sep 13 00:48:05.326000 audit: BPF prog-id=214 op=UNLOAD Sep 13 00:48:05.326000 audit: BPF prog-id=213 op=UNLOAD Sep 13 00:48:05.326000 audit[5224]: AVC avc: denied { bpf } for pid=5224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:05.326000 audit[5224]: AVC avc: denied { bpf } for pid=5224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:05.326000 audit[5224]: AVC avc: denied { bpf } for pid=5224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:05.326000 audit[5224]: AVC avc: denied { perfmon } for pid=5224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:05.326000 audit[5224]: AVC avc: denied { perfmon } for pid=5224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:05.326000 audit[5224]: AVC avc: denied { perfmon } for pid=5224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:05.326000 audit[5224]: AVC avc: denied { perfmon } for pid=5224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:05.326000 audit[5224]: AVC avc: denied { perfmon } for pid=5224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:05.326000 audit[5224]: AVC avc: denied { bpf } for pid=5224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:05.326000 audit[5224]: AVC avc: denied { bpf } for pid=5224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:05.326000 audit: BPF prog-id=215 op=LOAD Sep 13 00:48:05.326000 audit[5224]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c000025b88 items=0 ppid=4498 pid=5224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:05.326000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264636162326237333766313238663433366365343237303730323633 Sep 13 00:48:05.392515 env[1726]: time="2025-09-13T00:48:05.392456347Z" level=info msg="StartContainer for \"2dcab2b737f128f436ce4270702634b388ca241c96367299e10c32318a0deb6d\" returns successfully" Sep 13 00:48:06.149000 audit[5257]: NETFILTER_CFG table=filter:118 family=2 entries=14 op=nft_register_rule pid=5257 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:48:06.154567 kernel: kauditd_printk_skb: 369 callbacks suppressed Sep 13 00:48:06.154698 kernel: audit: type=1325 audit(1757724486.149:1309): table=filter:118 family=2 entries=14 op=nft_register_rule pid=5257 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:48:06.149000 audit[5257]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd3150b1b0 a2=0 a3=7ffd3150b19c items=0 ppid=2978 pid=5257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:06.166575 kernel: audit: type=1300 audit(1757724486.149:1309): arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd3150b1b0 a2=0 a3=7ffd3150b19c items=0 ppid=2978 pid=5257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:06.149000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:48:06.171565 kernel: audit: type=1327 audit(1757724486.149:1309): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:48:06.173000 audit[5257]: NETFILTER_CFG table=nat:119 family=2 entries=20 op=nft_register_rule pid=5257 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:48:06.183796 kernel: audit: type=1325 audit(1757724486.173:1310): table=nat:119 family=2 entries=20 op=nft_register_rule pid=5257 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:48:06.183960 kernel: audit: type=1300 audit(1757724486.173:1310): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd3150b1b0 a2=0 a3=7ffd3150b19c items=0 ppid=2978 pid=5257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:06.173000 audit[5257]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd3150b1b0 a2=0 a3=7ffd3150b19c items=0 ppid=2978 pid=5257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:06.173000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:48:06.190577 kernel: audit: type=1327 audit(1757724486.173:1310): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:48:06.208000 audit[2476]: AVC avc: denied { watch } for pid=2476 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:48:06.221578 kernel: audit: type=1400 audit(1757724486.208:1311): avc: denied { watch } for pid=2476 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:48:06.221696 kernel: audit: type=1300 audit(1757724486.208:1311): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000775020 a2=fc6 a3=0 items=0 ppid=2324 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 key=(null) Sep 13 00:48:06.208000 audit[2476]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000775020 a2=fc6 a3=0 items=0 ppid=2324 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 key=(null) Sep 13 00:48:06.208000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:48:06.228582 kernel: audit: type=1327 audit(1757724486.208:1311): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:48:06.238383 kernel: audit: type=1400 audit(1757724486.214:1312): avc: denied { watch } for pid=2476 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:48:06.214000 audit[2476]: AVC avc: denied { watch } for pid=2476 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:48:06.214000 audit[2476]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00216c090 a2=fc6 a3=0 items=0 ppid=2324 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 key=(null) Sep 13 00:48:06.214000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:48:06.904113 sshd[5101]: Failed password for root from 101.126.10.196 port 46282 ssh2 Sep 13 00:48:07.107561 kubelet[2611]: I0913 00:48:07.101727 2611 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Sep 13 00:48:07.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.26.227:22-147.75.109.163:35664 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:07.945093 systemd[1]: Started sshd@9-172.31.26.227:22-147.75.109.163:35664.service. Sep 13 00:48:08.079000 audit[2447]: AVC avc: denied { watch } for pid=2447 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c786 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:48:08.079000 audit[2447]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c00bebdb90 a2=fc6 a3=0 items=0 ppid=2296 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c786 key=(null) Sep 13 00:48:08.079000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E323237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Sep 13 00:48:08.087000 audit[2447]: AVC avc: denied { watch } for pid=2447 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c786 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:48:08.087000 audit[2447]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c0149d9580 a2=fc6 a3=0 items=0 ppid=2296 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c786 key=(null) Sep 13 00:48:08.087000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E323237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Sep 13 00:48:08.088000 audit[2447]: AVC avc: denied { watch } for pid=2447 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c786 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:48:08.088000 audit[2447]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c00bebdd40 a2=fc6 a3=0 items=0 ppid=2296 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c786 key=(null) Sep 13 00:48:08.088000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E323237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Sep 13 00:48:08.100000 audit[2447]: AVC avc: denied { watch } for pid=2447 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c786 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:48:08.100000 audit[2447]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c014492030 a2=fc6 a3=0 items=0 ppid=2296 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c786 key=(null) Sep 13 00:48:08.100000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E323237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Sep 13 00:48:08.118000 audit[2447]: AVC avc: denied { watch } for pid=2447 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c786 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:48:08.118000 audit[2447]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c00a08b4d0 a2=fc6 a3=0 items=0 ppid=2296 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c786 key=(null) Sep 13 00:48:08.118000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E323237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Sep 13 00:48:08.119000 audit[2447]: AVC avc: denied { watch } for pid=2447 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c786 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:48:08.119000 audit[2447]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c01497fc20 a2=fc6 a3=0 items=0 ppid=2296 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c786 key=(null) Sep 13 00:48:08.119000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E323237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Sep 13 00:48:08.187000 audit[5268]: USER_ACCT pid=5268 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:08.189771 sshd[5268]: Accepted publickey for core from 147.75.109.163 port 35664 ssh2: RSA SHA256:9zKSfA0UBs4YCbMNRE+jf2SchYlhVPu6zl9tBdI5N0M Sep 13 00:48:08.189000 audit[5268]: CRED_ACQ pid=5268 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:08.189000 audit[5268]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb7a033b0 a2=3 a3=0 items=0 ppid=1 pid=5268 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:08.189000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:48:08.193739 sshd[5268]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:48:08.214778 systemd-logind[1719]: New session 8 of user core. Sep 13 00:48:08.217434 systemd[1]: Started session-8.scope. Sep 13 00:48:08.229000 audit[5268]: USER_START pid=5268 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:08.232000 audit[5270]: CRED_ACQ pid=5270 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:08.309000 audit[5235]: AVC avc: denied { watch } for pid=5235 comm="apiserver" path="/calico-apiserver-certs/..2025_09_13_00_47_44.3007411467/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c750 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c224,c750 tclass=file permissive=0 Sep 13 00:48:08.309000 audit[5235]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0010637a0 a2=fc6 a3=0 items=0 ppid=4498 pid=5235 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c750 key=(null) Sep 13 00:48:08.309000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 13 00:48:09.162339 sshd[5101]: Connection closed by authenticating user root 101.126.10.196 port 46282 [preauth] Sep 13 00:48:09.163000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.26.227:22-101.126.10.196:46282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:09.163581 systemd[1]: sshd@8-172.31.26.227:22-101.126.10.196:46282.service: Deactivated successfully. Sep 13 00:48:09.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.26.227:22-101.126.10.196:60418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:09.339660 systemd[1]: Started sshd@10-172.31.26.227:22-101.126.10.196:60418.service. Sep 13 00:48:09.953429 sshd[5268]: pam_unix(sshd:session): session closed for user core Sep 13 00:48:09.961000 audit[5268]: USER_END pid=5268 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:09.962000 audit[5268]: CRED_DISP pid=5268 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:09.964000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.26.227:22-147.75.109.163:35664 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:09.965077 systemd[1]: sshd@9-172.31.26.227:22-147.75.109.163:35664.service: Deactivated successfully. Sep 13 00:48:09.966189 systemd[1]: session-8.scope: Deactivated successfully. Sep 13 00:48:09.972047 systemd-logind[1719]: Session 8 logged out. Waiting for processes to exit. Sep 13 00:48:09.975265 systemd-logind[1719]: Removed session 8. Sep 13 00:48:10.133850 kubelet[2611]: E0913 00:48:10.129385 2611 kubelet.go:2573] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="1.559s" Sep 13 00:48:11.179689 sshd[5283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.126.10.196 user=root Sep 13 00:48:11.193189 kernel: kauditd_printk_skb: 36 callbacks suppressed Sep 13 00:48:11.194594 kernel: audit: type=1100 audit(1757724491.179:1331): pid=5283 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.126.10.196 addr=101.126.10.196 terminal=ssh res=failed' Sep 13 00:48:11.179000 audit[5283]: USER_AUTH pid=5283 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.126.10.196 addr=101.126.10.196 terminal=ssh res=failed' Sep 13 00:48:11.198114 env[1726]: time="2025-09-13T00:48:11.198070834Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:11.204108 env[1726]: time="2025-09-13T00:48:11.204068313Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:df191a54fb79de3c693f8b1b864a1bd3bd14f63b3fff9d5fa4869c471ce3cd37,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:11.208359 env[1726]: time="2025-09-13T00:48:11.208318852Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:11.212486 env[1726]: time="2025-09-13T00:48:11.212442070Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:27c4187717f08f0a5727019d8beb7597665eb47e69eaa1d7d091a7e28913e577,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:11.214465 env[1726]: time="2025-09-13T00:48:11.213672481Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.3\" returns image reference \"sha256:df191a54fb79de3c693f8b1b864a1bd3bd14f63b3fff9d5fa4869c471ce3cd37\"" Sep 13 00:48:11.412863 env[1726]: time="2025-09-13T00:48:11.412576499Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.3\"" Sep 13 00:48:11.736836 env[1726]: time="2025-09-13T00:48:11.736587102Z" level=info msg="CreateContainer within sandbox \"910e1bf6374a998605fa05598fc25a3be12d6d238b1aea8e462788a19e87bd12\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Sep 13 00:48:11.789379 env[1726]: time="2025-09-13T00:48:11.789032179Z" level=info msg="CreateContainer within sandbox \"910e1bf6374a998605fa05598fc25a3be12d6d238b1aea8e462788a19e87bd12\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"1eed56009ba23edec9eccbcbd858431b2712595fa1dc76b77a553b20c735b507\"" Sep 13 00:48:11.796654 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1394964843.mount: Deactivated successfully. Sep 13 00:48:11.807597 env[1726]: time="2025-09-13T00:48:11.807539200Z" level=info msg="StartContainer for \"1eed56009ba23edec9eccbcbd858431b2712595fa1dc76b77a553b20c735b507\"" Sep 13 00:48:11.864523 systemd[1]: Started cri-containerd-1eed56009ba23edec9eccbcbd858431b2712595fa1dc76b77a553b20c735b507.scope. Sep 13 00:48:11.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:11.999815 kernel: audit: type=1400 audit(1757724491.975:1332): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:11.999946 kernel: audit: type=1400 audit(1757724491.975:1333): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:11.999990 kernel: audit: type=1400 audit(1757724491.975:1334): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:12.000035 kernel: audit: type=1400 audit(1757724491.975:1335): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:11.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:11.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:11.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:11.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:12.019574 kernel: audit: type=1400 audit(1757724491.975:1336): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:11.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:12.036042 kernel: audit: type=1400 audit(1757724491.975:1337): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:12.036184 kernel: audit: type=1400 audit(1757724491.975:1338): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:11.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:11.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:12.051575 kernel: audit: type=1400 audit(1757724491.975:1339): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:11.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:12.064580 kernel: audit: type=1400 audit(1757724491.975:1340): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:12.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:12.001000 audit: BPF prog-id=216 op=LOAD Sep 13 00:48:12.008000 audit[5295]: AVC avc: denied { bpf } for pid=5295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:12.008000 audit[5295]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4541 pid=5295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:12.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165656435363030396261323365646563396563636263626438353834 Sep 13 00:48:12.008000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:12.008000 audit[5295]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4541 pid=5295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:12.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165656435363030396261323365646563396563636263626438353834 Sep 13 00:48:12.008000 audit[5295]: AVC avc: denied { bpf } for pid=5295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:12.008000 audit[5295]: AVC avc: denied { bpf } for pid=5295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:12.008000 audit[5295]: AVC avc: denied { bpf } for pid=5295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:12.008000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:12.008000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:12.008000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:12.008000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:12.008000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:12.008000 audit[5295]: AVC avc: denied { bpf } for pid=5295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:12.008000 audit[5295]: AVC avc: denied { bpf } for pid=5295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:12.008000 audit: BPF prog-id=217 op=LOAD Sep 13 00:48:12.008000 audit[5295]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001cca20 items=0 ppid=4541 pid=5295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:12.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165656435363030396261323365646563396563636263626438353834 Sep 13 00:48:12.008000 audit[5295]: AVC avc: denied { bpf } for pid=5295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:12.008000 audit[5295]: AVC avc: denied { bpf } for pid=5295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:12.008000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:12.008000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:12.008000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:12.008000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:12.008000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:12.008000 audit[5295]: AVC avc: denied { bpf } for pid=5295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:12.008000 audit[5295]: AVC avc: denied { bpf } for pid=5295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:12.008000 audit: BPF prog-id=218 op=LOAD Sep 13 00:48:12.008000 audit[5295]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001cca68 items=0 ppid=4541 pid=5295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:12.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165656435363030396261323365646563396563636263626438353834 Sep 13 00:48:12.008000 audit: BPF prog-id=218 op=UNLOAD Sep 13 00:48:12.008000 audit: BPF prog-id=217 op=UNLOAD Sep 13 00:48:12.008000 audit[5295]: AVC avc: denied { bpf } for pid=5295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:12.008000 audit[5295]: AVC avc: denied { bpf } for pid=5295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:12.008000 audit[5295]: AVC avc: denied { bpf } for pid=5295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:12.008000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:12.008000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:12.008000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:12.008000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:12.008000 audit[5295]: AVC avc: denied { perfmon } for pid=5295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:12.008000 audit[5295]: AVC avc: denied { bpf } for pid=5295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:12.008000 audit[5295]: AVC avc: denied { bpf } for pid=5295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:12.008000 audit: BPF prog-id=219 op=LOAD Sep 13 00:48:12.008000 audit[5295]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0001cce78 items=0 ppid=4541 pid=5295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:12.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165656435363030396261323365646563396563636263626438353834 Sep 13 00:48:12.100903 env[1726]: time="2025-09-13T00:48:12.100843431Z" level=info msg="StartContainer for \"1eed56009ba23edec9eccbcbd858431b2712595fa1dc76b77a553b20c735b507\" returns successfully" Sep 13 00:48:12.594376 env[1726]: time="2025-09-13T00:48:12.593937607Z" level=info msg="StopPodSandbox for \"5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d\"" Sep 13 00:48:12.749007 sshd[5283]: Failed password for root from 101.126.10.196 port 60418 ssh2 Sep 13 00:48:13.191014 kubelet[2611]: I0913 00:48:13.187845 2611 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-75d655b7b-m8hcv" podStartSLOduration=37.212386783 podStartE2EDuration="44.185499272s" podCreationTimestamp="2025-09-13 00:47:29 +0000 UTC" firstStartedPulling="2025-09-13 00:47:58.195743318 +0000 UTC m=+45.884857312" lastFinishedPulling="2025-09-13 00:48:05.168855807 +0000 UTC m=+52.857969801" observedRunningTime="2025-09-13 00:48:06.093252731 +0000 UTC m=+53.782366733" watchObservedRunningTime="2025-09-13 00:48:13.185499272 +0000 UTC m=+60.874613274" Sep 13 00:48:13.227115 kubelet[2611]: I0913 00:48:13.227052 2611 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-c859df7bc-8p7k4" podStartSLOduration=26.120476601 podStartE2EDuration="39.227028159s" podCreationTimestamp="2025-09-13 00:47:34 +0000 UTC" firstStartedPulling="2025-09-13 00:47:58.287879484 +0000 UTC m=+45.976993476" lastFinishedPulling="2025-09-13 00:48:11.394431034 +0000 UTC m=+59.083545034" observedRunningTime="2025-09-13 00:48:13.192936069 +0000 UTC m=+60.882050073" watchObservedRunningTime="2025-09-13 00:48:13.227028159 +0000 UTC m=+60.916142161" Sep 13 00:48:13.281000 audit[2476]: AVC avc: denied { watch } for pid=2476 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:48:13.281000 audit[2476]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001c53520 a2=fc6 a3=0 items=0 ppid=2324 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 key=(null) Sep 13 00:48:13.281000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:48:13.294000 audit[2476]: AVC avc: denied { watch } for pid=2476 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:48:13.294000 audit[2476]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001c53980 a2=fc6 a3=0 items=0 ppid=2324 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 key=(null) Sep 13 00:48:13.294000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:48:13.300000 audit[2476]: AVC avc: denied { watch } for pid=2476 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:48:13.300000 audit[2476]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001f6c460 a2=fc6 a3=0 items=0 ppid=2324 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 key=(null) Sep 13 00:48:13.300000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:48:13.301000 audit[2476]: AVC avc: denied { watch } for pid=2476 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:48:13.301000 audit[2476]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001f6c480 a2=fc6 a3=0 items=0 ppid=2324 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 key=(null) Sep 13 00:48:13.301000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:48:13.539232 sshd[5283]: Connection closed by authenticating user root 101.126.10.196 port 60418 [preauth] Sep 13 00:48:13.542000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.26.227:22-101.126.10.196:60418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:13.542272 systemd[1]: sshd@10-172.31.26.227:22-101.126.10.196:60418.service: Deactivated successfully. Sep 13 00:48:13.608656 env[1726]: 2025-09-13 00:48:13.175 [WARNING][5341] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--227-k8s-calico--kube--controllers--c859df7bc--8p7k4-eth0", GenerateName:"calico-kube-controllers-c859df7bc-", Namespace:"calico-system", SelfLink:"", UID:"16d0b1a9-37f6-4d2e-b8a8-ba59e19f0516", ResourceVersion:"950", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 47, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"c859df7bc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-227", ContainerID:"910e1bf6374a998605fa05598fc25a3be12d6d238b1aea8e462788a19e87bd12", Pod:"calico-kube-controllers-c859df7bc-8p7k4", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.43.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid7d7ed5354e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:48:13.608656 env[1726]: 2025-09-13 00:48:13.179 [INFO][5341] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d" Sep 13 00:48:13.608656 env[1726]: 2025-09-13 00:48:13.180 [INFO][5341] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d" iface="eth0" netns="" Sep 13 00:48:13.608656 env[1726]: 2025-09-13 00:48:13.180 [INFO][5341] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d" Sep 13 00:48:13.608656 env[1726]: 2025-09-13 00:48:13.180 [INFO][5341] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d" Sep 13 00:48:13.608656 env[1726]: 2025-09-13 00:48:13.567 [INFO][5348] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d" HandleID="k8s-pod-network.5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d" Workload="ip--172--31--26--227-k8s-calico--kube--controllers--c859df7bc--8p7k4-eth0" Sep 13 00:48:13.608656 env[1726]: 2025-09-13 00:48:13.570 [INFO][5348] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:48:13.608656 env[1726]: 2025-09-13 00:48:13.571 [INFO][5348] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:48:13.608656 env[1726]: 2025-09-13 00:48:13.595 [WARNING][5348] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d" HandleID="k8s-pod-network.5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d" Workload="ip--172--31--26--227-k8s-calico--kube--controllers--c859df7bc--8p7k4-eth0" Sep 13 00:48:13.608656 env[1726]: 2025-09-13 00:48:13.595 [INFO][5348] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d" HandleID="k8s-pod-network.5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d" Workload="ip--172--31--26--227-k8s-calico--kube--controllers--c859df7bc--8p7k4-eth0" Sep 13 00:48:13.608656 env[1726]: 2025-09-13 00:48:13.602 [INFO][5348] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:48:13.608656 env[1726]: 2025-09-13 00:48:13.605 [INFO][5341] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d" Sep 13 00:48:13.610270 env[1726]: time="2025-09-13T00:48:13.608671123Z" level=info msg="TearDown network for sandbox \"5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d\" successfully" Sep 13 00:48:13.610270 env[1726]: time="2025-09-13T00:48:13.608730601Z" level=info msg="StopPodSandbox for \"5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d\" returns successfully" Sep 13 00:48:13.634000 audit[5356]: NETFILTER_CFG table=filter:120 family=2 entries=14 op=nft_register_rule pid=5356 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:48:13.634000 audit[5356]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff32876b50 a2=0 a3=7fff32876b3c items=0 ppid=2978 pid=5356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:13.634000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:48:13.684000 audit[5356]: NETFILTER_CFG table=nat:121 family=2 entries=56 op=nft_register_chain pid=5356 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:48:13.684000 audit[5356]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fff32876b50 a2=0 a3=7fff32876b3c items=0 ppid=2978 pid=5356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:13.684000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:48:13.688785 env[1726]: time="2025-09-13T00:48:13.688114756Z" level=info msg="RemovePodSandbox for \"5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d\"" Sep 13 00:48:13.688785 env[1726]: time="2025-09-13T00:48:13.688156381Z" level=info msg="Forcibly stopping sandbox \"5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d\"" Sep 13 00:48:13.957196 env[1726]: 2025-09-13 00:48:13.866 [WARNING][5368] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--227-k8s-calico--kube--controllers--c859df7bc--8p7k4-eth0", GenerateName:"calico-kube-controllers-c859df7bc-", Namespace:"calico-system", SelfLink:"", UID:"16d0b1a9-37f6-4d2e-b8a8-ba59e19f0516", ResourceVersion:"1098", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 47, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"c859df7bc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-227", ContainerID:"910e1bf6374a998605fa05598fc25a3be12d6d238b1aea8e462788a19e87bd12", Pod:"calico-kube-controllers-c859df7bc-8p7k4", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.43.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid7d7ed5354e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:48:13.957196 env[1726]: 2025-09-13 00:48:13.867 [INFO][5368] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d" Sep 13 00:48:13.957196 env[1726]: 2025-09-13 00:48:13.867 [INFO][5368] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d" iface="eth0" netns="" Sep 13 00:48:13.957196 env[1726]: 2025-09-13 00:48:13.867 [INFO][5368] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d" Sep 13 00:48:13.957196 env[1726]: 2025-09-13 00:48:13.867 [INFO][5368] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d" Sep 13 00:48:13.957196 env[1726]: 2025-09-13 00:48:13.916 [INFO][5375] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d" HandleID="k8s-pod-network.5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d" Workload="ip--172--31--26--227-k8s-calico--kube--controllers--c859df7bc--8p7k4-eth0" Sep 13 00:48:13.957196 env[1726]: 2025-09-13 00:48:13.916 [INFO][5375] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:48:13.957196 env[1726]: 2025-09-13 00:48:13.917 [INFO][5375] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:48:13.957196 env[1726]: 2025-09-13 00:48:13.935 [WARNING][5375] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d" HandleID="k8s-pod-network.5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d" Workload="ip--172--31--26--227-k8s-calico--kube--controllers--c859df7bc--8p7k4-eth0" Sep 13 00:48:13.957196 env[1726]: 2025-09-13 00:48:13.935 [INFO][5375] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d" HandleID="k8s-pod-network.5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d" Workload="ip--172--31--26--227-k8s-calico--kube--controllers--c859df7bc--8p7k4-eth0" Sep 13 00:48:13.957196 env[1726]: 2025-09-13 00:48:13.946 [INFO][5375] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:48:13.957196 env[1726]: 2025-09-13 00:48:13.950 [INFO][5368] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d" Sep 13 00:48:13.958964 env[1726]: time="2025-09-13T00:48:13.957853670Z" level=info msg="TearDown network for sandbox \"5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d\" successfully" Sep 13 00:48:13.970473 env[1726]: time="2025-09-13T00:48:13.970434143Z" level=info msg="RemovePodSandbox \"5f27daf153e5702c2ec15a54065bb2d6db3248c8fafff45e17c67a3c5e3e340d\" returns successfully" Sep 13 00:48:13.971481 env[1726]: time="2025-09-13T00:48:13.971455448Z" level=info msg="StopPodSandbox for \"ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a\"" Sep 13 00:48:14.119369 systemd[1]: run-containerd-runc-k8s.io-1eed56009ba23edec9eccbcbd858431b2712595fa1dc76b77a553b20c735b507-runc.ySTgtm.mount: Deactivated successfully. Sep 13 00:48:14.247874 env[1726]: 2025-09-13 00:48:14.114 [WARNING][5389] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--227-k8s-goldmane--54d579b49d--krd8k-eth0", GenerateName:"goldmane-54d579b49d-", Namespace:"calico-system", SelfLink:"", UID:"908b4e5f-addd-4d5c-a146-1b9da1f1b4f4", ResourceVersion:"993", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 47, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"54d579b49d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-227", ContainerID:"9870e5e3afcdef073f5cd2d7b0aca7ef5ad2fa927f01b068251c11360409e173", Pod:"goldmane-54d579b49d-krd8k", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.43.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali71d91ac77ec", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:48:14.247874 env[1726]: 2025-09-13 00:48:14.117 [INFO][5389] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a" Sep 13 00:48:14.247874 env[1726]: 2025-09-13 00:48:14.117 [INFO][5389] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a" iface="eth0" netns="" Sep 13 00:48:14.247874 env[1726]: 2025-09-13 00:48:14.117 [INFO][5389] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a" Sep 13 00:48:14.247874 env[1726]: 2025-09-13 00:48:14.117 [INFO][5389] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a" Sep 13 00:48:14.247874 env[1726]: 2025-09-13 00:48:14.213 [INFO][5408] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a" HandleID="k8s-pod-network.ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a" Workload="ip--172--31--26--227-k8s-goldmane--54d579b49d--krd8k-eth0" Sep 13 00:48:14.247874 env[1726]: 2025-09-13 00:48:14.213 [INFO][5408] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:48:14.247874 env[1726]: 2025-09-13 00:48:14.214 [INFO][5408] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:48:14.247874 env[1726]: 2025-09-13 00:48:14.225 [WARNING][5408] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a" HandleID="k8s-pod-network.ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a" Workload="ip--172--31--26--227-k8s-goldmane--54d579b49d--krd8k-eth0" Sep 13 00:48:14.247874 env[1726]: 2025-09-13 00:48:14.225 [INFO][5408] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a" HandleID="k8s-pod-network.ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a" Workload="ip--172--31--26--227-k8s-goldmane--54d579b49d--krd8k-eth0" Sep 13 00:48:14.247874 env[1726]: 2025-09-13 00:48:14.239 [INFO][5408] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:48:14.247874 env[1726]: 2025-09-13 00:48:14.242 [INFO][5389] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a" Sep 13 00:48:14.247874 env[1726]: time="2025-09-13T00:48:14.247748634Z" level=info msg="TearDown network for sandbox \"ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a\" successfully" Sep 13 00:48:14.247874 env[1726]: time="2025-09-13T00:48:14.247784276Z" level=info msg="StopPodSandbox for \"ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a\" returns successfully" Sep 13 00:48:14.250663 env[1726]: time="2025-09-13T00:48:14.249271422Z" level=info msg="RemovePodSandbox for \"ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a\"" Sep 13 00:48:14.250663 env[1726]: time="2025-09-13T00:48:14.249309957Z" level=info msg="Forcibly stopping sandbox \"ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a\"" Sep 13 00:48:14.416523 env[1726]: 2025-09-13 00:48:14.339 [WARNING][5431] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--227-k8s-goldmane--54d579b49d--krd8k-eth0", GenerateName:"goldmane-54d579b49d-", Namespace:"calico-system", SelfLink:"", UID:"908b4e5f-addd-4d5c-a146-1b9da1f1b4f4", ResourceVersion:"993", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 47, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"54d579b49d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-227", ContainerID:"9870e5e3afcdef073f5cd2d7b0aca7ef5ad2fa927f01b068251c11360409e173", Pod:"goldmane-54d579b49d-krd8k", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.43.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali71d91ac77ec", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:48:14.416523 env[1726]: 2025-09-13 00:48:14.339 [INFO][5431] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a" Sep 13 00:48:14.416523 env[1726]: 2025-09-13 00:48:14.340 [INFO][5431] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a" iface="eth0" netns="" Sep 13 00:48:14.416523 env[1726]: 2025-09-13 00:48:14.340 [INFO][5431] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a" Sep 13 00:48:14.416523 env[1726]: 2025-09-13 00:48:14.340 [INFO][5431] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a" Sep 13 00:48:14.416523 env[1726]: 2025-09-13 00:48:14.394 [INFO][5439] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a" HandleID="k8s-pod-network.ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a" Workload="ip--172--31--26--227-k8s-goldmane--54d579b49d--krd8k-eth0" Sep 13 00:48:14.416523 env[1726]: 2025-09-13 00:48:14.394 [INFO][5439] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:48:14.416523 env[1726]: 2025-09-13 00:48:14.394 [INFO][5439] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:48:14.416523 env[1726]: 2025-09-13 00:48:14.408 [WARNING][5439] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a" HandleID="k8s-pod-network.ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a" Workload="ip--172--31--26--227-k8s-goldmane--54d579b49d--krd8k-eth0" Sep 13 00:48:14.416523 env[1726]: 2025-09-13 00:48:14.408 [INFO][5439] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a" HandleID="k8s-pod-network.ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a" Workload="ip--172--31--26--227-k8s-goldmane--54d579b49d--krd8k-eth0" Sep 13 00:48:14.416523 env[1726]: 2025-09-13 00:48:14.411 [INFO][5439] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:48:14.416523 env[1726]: 2025-09-13 00:48:14.414 [INFO][5431] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a" Sep 13 00:48:14.417924 env[1726]: time="2025-09-13T00:48:14.416935152Z" level=info msg="TearDown network for sandbox \"ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a\" successfully" Sep 13 00:48:14.468923 env[1726]: time="2025-09-13T00:48:14.468869069Z" level=info msg="RemovePodSandbox \"ea872c6f66781edc0c715f6776e1102f9b299c28fed74dfaae59840fd6551b1a\" returns successfully" Sep 13 00:48:14.469758 env[1726]: time="2025-09-13T00:48:14.469727220Z" level=info msg="StopPodSandbox for \"c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d\"" Sep 13 00:48:14.677881 env[1726]: 2025-09-13 00:48:14.614 [WARNING][5454] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--65mmj-eth0", GenerateName:"calico-apiserver-75d655b7b-", Namespace:"calico-apiserver", SelfLink:"", UID:"3c832220-40d0-406a-bbd8-8df3c514c55e", ResourceVersion:"986", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 47, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75d655b7b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-227", ContainerID:"d5b033a9f41ca9b9e35620f43a5cf0e836b873c77c5b0bf707d859712fd7ea36", Pod:"calico-apiserver-75d655b7b-65mmj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.43.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1500d249cae", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:48:14.677881 env[1726]: 2025-09-13 00:48:14.614 [INFO][5454] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d" Sep 13 00:48:14.677881 env[1726]: 2025-09-13 00:48:14.614 [INFO][5454] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d" iface="eth0" netns="" Sep 13 00:48:14.677881 env[1726]: 2025-09-13 00:48:14.614 [INFO][5454] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d" Sep 13 00:48:14.677881 env[1726]: 2025-09-13 00:48:14.614 [INFO][5454] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d" Sep 13 00:48:14.677881 env[1726]: 2025-09-13 00:48:14.661 [INFO][5461] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d" HandleID="k8s-pod-network.c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d" Workload="ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--65mmj-eth0" Sep 13 00:48:14.677881 env[1726]: 2025-09-13 00:48:14.661 [INFO][5461] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:48:14.677881 env[1726]: 2025-09-13 00:48:14.661 [INFO][5461] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:48:14.677881 env[1726]: 2025-09-13 00:48:14.670 [WARNING][5461] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d" HandleID="k8s-pod-network.c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d" Workload="ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--65mmj-eth0" Sep 13 00:48:14.677881 env[1726]: 2025-09-13 00:48:14.670 [INFO][5461] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d" HandleID="k8s-pod-network.c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d" Workload="ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--65mmj-eth0" Sep 13 00:48:14.677881 env[1726]: 2025-09-13 00:48:14.672 [INFO][5461] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:48:14.677881 env[1726]: 2025-09-13 00:48:14.675 [INFO][5454] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d" Sep 13 00:48:14.680388 env[1726]: time="2025-09-13T00:48:14.678600916Z" level=info msg="TearDown network for sandbox \"c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d\" successfully" Sep 13 00:48:14.680388 env[1726]: time="2025-09-13T00:48:14.678654886Z" level=info msg="StopPodSandbox for \"c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d\" returns successfully" Sep 13 00:48:14.680388 env[1726]: time="2025-09-13T00:48:14.679734917Z" level=info msg="RemovePodSandbox for \"c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d\"" Sep 13 00:48:14.680388 env[1726]: time="2025-09-13T00:48:14.679773744Z" level=info msg="Forcibly stopping sandbox \"c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d\"" Sep 13 00:48:14.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.26.227:22-101.126.10.196:60432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:14.778956 systemd[1]: Started sshd@11-172.31.26.227:22-101.126.10.196:60432.service. Sep 13 00:48:14.840583 env[1726]: 2025-09-13 00:48:14.758 [WARNING][5478] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--65mmj-eth0", GenerateName:"calico-apiserver-75d655b7b-", Namespace:"calico-apiserver", SelfLink:"", UID:"3c832220-40d0-406a-bbd8-8df3c514c55e", ResourceVersion:"986", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 47, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75d655b7b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-227", ContainerID:"d5b033a9f41ca9b9e35620f43a5cf0e836b873c77c5b0bf707d859712fd7ea36", Pod:"calico-apiserver-75d655b7b-65mmj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.43.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1500d249cae", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:48:14.840583 env[1726]: 2025-09-13 00:48:14.758 [INFO][5478] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d" Sep 13 00:48:14.840583 env[1726]: 2025-09-13 00:48:14.758 [INFO][5478] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d" iface="eth0" netns="" Sep 13 00:48:14.840583 env[1726]: 2025-09-13 00:48:14.758 [INFO][5478] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d" Sep 13 00:48:14.840583 env[1726]: 2025-09-13 00:48:14.758 [INFO][5478] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d" Sep 13 00:48:14.840583 env[1726]: 2025-09-13 00:48:14.808 [INFO][5485] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d" HandleID="k8s-pod-network.c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d" Workload="ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--65mmj-eth0" Sep 13 00:48:14.840583 env[1726]: 2025-09-13 00:48:14.808 [INFO][5485] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:48:14.840583 env[1726]: 2025-09-13 00:48:14.809 [INFO][5485] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:48:14.840583 env[1726]: 2025-09-13 00:48:14.816 [WARNING][5485] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d" HandleID="k8s-pod-network.c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d" Workload="ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--65mmj-eth0" Sep 13 00:48:14.840583 env[1726]: 2025-09-13 00:48:14.816 [INFO][5485] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d" HandleID="k8s-pod-network.c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d" Workload="ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--65mmj-eth0" Sep 13 00:48:14.840583 env[1726]: 2025-09-13 00:48:14.824 [INFO][5485] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:48:14.840583 env[1726]: 2025-09-13 00:48:14.826 [INFO][5478] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d" Sep 13 00:48:14.843958 env[1726]: time="2025-09-13T00:48:14.840913950Z" level=info msg="TearDown network for sandbox \"c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d\" successfully" Sep 13 00:48:14.857459 env[1726]: time="2025-09-13T00:48:14.857410412Z" level=info msg="RemovePodSandbox \"c5555d7e205504555a3e4cfb2b3a1fbb975f4ea48e7c749844c61c4dda72676d\" returns successfully" Sep 13 00:48:14.858573 env[1726]: time="2025-09-13T00:48:14.858533850Z" level=info msg="StopPodSandbox for \"9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41\"" Sep 13 00:48:14.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.26.227:22-147.75.109.163:54666 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:14.976440 systemd[1]: Started sshd@12-172.31.26.227:22-147.75.109.163:54666.service. Sep 13 00:48:15.104938 env[1726]: 2025-09-13 00:48:14.955 [WARNING][5501] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--m8hcv-eth0", GenerateName:"calico-apiserver-75d655b7b-", Namespace:"calico-apiserver", SelfLink:"", UID:"e8d89abb-6036-40eb-8686-f59fb32e8978", ResourceVersion:"1028", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 47, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75d655b7b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-227", ContainerID:"c1c488c5db2d36aa6721803e4822b9c4777c4a78b7bb4679bbe3fe82d2a5b7f6", Pod:"calico-apiserver-75d655b7b-m8hcv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.43.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2543d660658", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:48:15.104938 env[1726]: 2025-09-13 00:48:14.956 [INFO][5501] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41" Sep 13 00:48:15.104938 env[1726]: 2025-09-13 00:48:14.956 [INFO][5501] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41" iface="eth0" netns="" Sep 13 00:48:15.104938 env[1726]: 2025-09-13 00:48:14.956 [INFO][5501] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41" Sep 13 00:48:15.104938 env[1726]: 2025-09-13 00:48:14.956 [INFO][5501] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41" Sep 13 00:48:15.104938 env[1726]: 2025-09-13 00:48:15.049 [INFO][5508] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41" HandleID="k8s-pod-network.9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41" Workload="ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--m8hcv-eth0" Sep 13 00:48:15.104938 env[1726]: 2025-09-13 00:48:15.057 [INFO][5508] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:48:15.104938 env[1726]: 2025-09-13 00:48:15.057 [INFO][5508] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:48:15.104938 env[1726]: 2025-09-13 00:48:15.078 [WARNING][5508] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41" HandleID="k8s-pod-network.9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41" Workload="ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--m8hcv-eth0" Sep 13 00:48:15.104938 env[1726]: 2025-09-13 00:48:15.079 [INFO][5508] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41" HandleID="k8s-pod-network.9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41" Workload="ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--m8hcv-eth0" Sep 13 00:48:15.104938 env[1726]: 2025-09-13 00:48:15.089 [INFO][5508] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:48:15.104938 env[1726]: 2025-09-13 00:48:15.097 [INFO][5501] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41" Sep 13 00:48:15.106346 env[1726]: time="2025-09-13T00:48:15.104960576Z" level=info msg="TearDown network for sandbox \"9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41\" successfully" Sep 13 00:48:15.106346 env[1726]: time="2025-09-13T00:48:15.104997479Z" level=info msg="StopPodSandbox for \"9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41\" returns successfully" Sep 13 00:48:15.110491 env[1726]: time="2025-09-13T00:48:15.110448659Z" level=info msg="RemovePodSandbox for \"9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41\"" Sep 13 00:48:15.111289 env[1726]: time="2025-09-13T00:48:15.110660539Z" level=info msg="Forcibly stopping sandbox \"9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41\"" Sep 13 00:48:15.173000 audit[5510]: USER_ACCT pid=5510 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:15.174676 sshd[5510]: Accepted publickey for core from 147.75.109.163 port 54666 ssh2: RSA SHA256:9zKSfA0UBs4YCbMNRE+jf2SchYlhVPu6zl9tBdI5N0M Sep 13 00:48:15.176000 audit[5510]: CRED_ACQ pid=5510 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:15.176000 audit[5510]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4d6eea80 a2=3 a3=0 items=0 ppid=1 pid=5510 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:15.176000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:48:15.179064 sshd[5510]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:48:15.209253 systemd-logind[1719]: New session 9 of user core. Sep 13 00:48:15.210282 systemd[1]: Started session-9.scope. Sep 13 00:48:15.222000 audit[5510]: USER_START pid=5510 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:15.224000 audit[5531]: CRED_ACQ pid=5531 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:15.384566 env[1726]: 2025-09-13 00:48:15.274 [WARNING][5526] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--m8hcv-eth0", GenerateName:"calico-apiserver-75d655b7b-", Namespace:"calico-apiserver", SelfLink:"", UID:"e8d89abb-6036-40eb-8686-f59fb32e8978", ResourceVersion:"1028", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 47, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75d655b7b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-227", ContainerID:"c1c488c5db2d36aa6721803e4822b9c4777c4a78b7bb4679bbe3fe82d2a5b7f6", Pod:"calico-apiserver-75d655b7b-m8hcv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.43.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2543d660658", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:48:15.384566 env[1726]: 2025-09-13 00:48:15.275 [INFO][5526] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41" Sep 13 00:48:15.384566 env[1726]: 2025-09-13 00:48:15.275 [INFO][5526] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41" iface="eth0" netns="" Sep 13 00:48:15.384566 env[1726]: 2025-09-13 00:48:15.275 [INFO][5526] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41" Sep 13 00:48:15.384566 env[1726]: 2025-09-13 00:48:15.275 [INFO][5526] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41" Sep 13 00:48:15.384566 env[1726]: 2025-09-13 00:48:15.332 [INFO][5534] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41" HandleID="k8s-pod-network.9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41" Workload="ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--m8hcv-eth0" Sep 13 00:48:15.384566 env[1726]: 2025-09-13 00:48:15.342 [INFO][5534] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:48:15.384566 env[1726]: 2025-09-13 00:48:15.342 [INFO][5534] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:48:15.384566 env[1726]: 2025-09-13 00:48:15.368 [WARNING][5534] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41" HandleID="k8s-pod-network.9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41" Workload="ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--m8hcv-eth0" Sep 13 00:48:15.384566 env[1726]: 2025-09-13 00:48:15.368 [INFO][5534] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41" HandleID="k8s-pod-network.9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41" Workload="ip--172--31--26--227-k8s-calico--apiserver--75d655b7b--m8hcv-eth0" Sep 13 00:48:15.384566 env[1726]: 2025-09-13 00:48:15.371 [INFO][5534] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:48:15.384566 env[1726]: 2025-09-13 00:48:15.374 [INFO][5526] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41" Sep 13 00:48:15.384566 env[1726]: time="2025-09-13T00:48:15.381894213Z" level=info msg="TearDown network for sandbox \"9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41\" successfully" Sep 13 00:48:15.396600 env[1726]: time="2025-09-13T00:48:15.395486806Z" level=info msg="RemovePodSandbox \"9bd038e452e6ddb8fbf17ec79978152724a4f146798007ccaf562124e13f2f41\" returns successfully" Sep 13 00:48:15.396600 env[1726]: time="2025-09-13T00:48:15.396105222Z" level=info msg="StopPodSandbox for \"7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d\"" Sep 13 00:48:15.694685 env[1726]: 2025-09-13 00:48:15.538 [WARNING][5552] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--227-k8s-coredns--668d6bf9bc--j248j-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"25e06c1f-1251-4571-ab79-6a6602efc42f", ResourceVersion:"1100", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 47, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-227", ContainerID:"c0105be3f439e6074e268de539114ab91ce501fe866dc87c91a24b3d2f5c21e7", Pod:"coredns-668d6bf9bc-j248j", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.43.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali80b4eaf1821", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:48:15.694685 env[1726]: 2025-09-13 00:48:15.540 [INFO][5552] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d" Sep 13 00:48:15.694685 env[1726]: 2025-09-13 00:48:15.540 [INFO][5552] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d" iface="eth0" netns="" Sep 13 00:48:15.694685 env[1726]: 2025-09-13 00:48:15.541 [INFO][5552] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d" Sep 13 00:48:15.694685 env[1726]: 2025-09-13 00:48:15.541 [INFO][5552] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d" Sep 13 00:48:15.694685 env[1726]: 2025-09-13 00:48:15.640 [INFO][5562] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d" HandleID="k8s-pod-network.7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d" Workload="ip--172--31--26--227-k8s-coredns--668d6bf9bc--j248j-eth0" Sep 13 00:48:15.694685 env[1726]: 2025-09-13 00:48:15.641 [INFO][5562] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:48:15.694685 env[1726]: 2025-09-13 00:48:15.641 [INFO][5562] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:48:15.694685 env[1726]: 2025-09-13 00:48:15.661 [WARNING][5562] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d" HandleID="k8s-pod-network.7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d" Workload="ip--172--31--26--227-k8s-coredns--668d6bf9bc--j248j-eth0" Sep 13 00:48:15.694685 env[1726]: 2025-09-13 00:48:15.661 [INFO][5562] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d" HandleID="k8s-pod-network.7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d" Workload="ip--172--31--26--227-k8s-coredns--668d6bf9bc--j248j-eth0" Sep 13 00:48:15.694685 env[1726]: 2025-09-13 00:48:15.667 [INFO][5562] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:48:15.694685 env[1726]: 2025-09-13 00:48:15.683 [INFO][5552] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d" Sep 13 00:48:15.694685 env[1726]: time="2025-09-13T00:48:15.693828151Z" level=info msg="TearDown network for sandbox \"7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d\" successfully" Sep 13 00:48:15.694685 env[1726]: time="2025-09-13T00:48:15.693865842Z" level=info msg="StopPodSandbox for \"7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d\" returns successfully" Sep 13 00:48:15.694685 env[1726]: time="2025-09-13T00:48:15.694392860Z" level=info msg="RemovePodSandbox for \"7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d\"" Sep 13 00:48:15.694685 env[1726]: time="2025-09-13T00:48:15.694426607Z" level=info msg="Forcibly stopping sandbox \"7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d\"" Sep 13 00:48:15.948832 env[1726]: 2025-09-13 00:48:15.833 [WARNING][5577] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--227-k8s-coredns--668d6bf9bc--j248j-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"25e06c1f-1251-4571-ab79-6a6602efc42f", ResourceVersion:"1100", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 47, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-227", ContainerID:"c0105be3f439e6074e268de539114ab91ce501fe866dc87c91a24b3d2f5c21e7", Pod:"coredns-668d6bf9bc-j248j", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.43.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali80b4eaf1821", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:48:15.948832 env[1726]: 2025-09-13 00:48:15.834 [INFO][5577] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d" Sep 13 00:48:15.948832 env[1726]: 2025-09-13 00:48:15.834 [INFO][5577] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d" iface="eth0" netns="" Sep 13 00:48:15.948832 env[1726]: 2025-09-13 00:48:15.834 [INFO][5577] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d" Sep 13 00:48:15.948832 env[1726]: 2025-09-13 00:48:15.834 [INFO][5577] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d" Sep 13 00:48:15.948832 env[1726]: 2025-09-13 00:48:15.928 [INFO][5584] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d" HandleID="k8s-pod-network.7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d" Workload="ip--172--31--26--227-k8s-coredns--668d6bf9bc--j248j-eth0" Sep 13 00:48:15.948832 env[1726]: 2025-09-13 00:48:15.928 [INFO][5584] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:48:15.948832 env[1726]: 2025-09-13 00:48:15.929 [INFO][5584] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:48:15.948832 env[1726]: 2025-09-13 00:48:15.937 [WARNING][5584] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d" HandleID="k8s-pod-network.7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d" Workload="ip--172--31--26--227-k8s-coredns--668d6bf9bc--j248j-eth0" Sep 13 00:48:15.948832 env[1726]: 2025-09-13 00:48:15.937 [INFO][5584] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d" HandleID="k8s-pod-network.7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d" Workload="ip--172--31--26--227-k8s-coredns--668d6bf9bc--j248j-eth0" Sep 13 00:48:15.948832 env[1726]: 2025-09-13 00:48:15.941 [INFO][5584] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:48:15.948832 env[1726]: 2025-09-13 00:48:15.944 [INFO][5577] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d" Sep 13 00:48:15.948832 env[1726]: time="2025-09-13T00:48:15.948697436Z" level=info msg="TearDown network for sandbox \"7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d\" successfully" Sep 13 00:48:15.964969 env[1726]: time="2025-09-13T00:48:15.964444677Z" level=info msg="RemovePodSandbox \"7a9f49504fb69ff2e5145b709c26428ad43fc469dbcc54275171760bfeecb89d\" returns successfully" Sep 13 00:48:15.965485 env[1726]: time="2025-09-13T00:48:15.965080092Z" level=info msg="StopPodSandbox for \"2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e\"" Sep 13 00:48:16.341381 env[1726]: 2025-09-13 00:48:16.132 [WARNING][5598] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e" WorkloadEndpoint="ip--172--31--26--227-k8s-whisker--744ff764b6--md9lk-eth0" Sep 13 00:48:16.341381 env[1726]: 2025-09-13 00:48:16.133 [INFO][5598] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e" Sep 13 00:48:16.341381 env[1726]: 2025-09-13 00:48:16.133 [INFO][5598] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e" iface="eth0" netns="" Sep 13 00:48:16.341381 env[1726]: 2025-09-13 00:48:16.133 [INFO][5598] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e" Sep 13 00:48:16.341381 env[1726]: 2025-09-13 00:48:16.133 [INFO][5598] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e" Sep 13 00:48:16.341381 env[1726]: 2025-09-13 00:48:16.264 [INFO][5606] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e" HandleID="k8s-pod-network.2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e" Workload="ip--172--31--26--227-k8s-whisker--744ff764b6--md9lk-eth0" Sep 13 00:48:16.341381 env[1726]: 2025-09-13 00:48:16.268 [INFO][5606] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:48:16.341381 env[1726]: 2025-09-13 00:48:16.270 [INFO][5606] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:48:16.341381 env[1726]: 2025-09-13 00:48:16.303 [WARNING][5606] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e" HandleID="k8s-pod-network.2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e" Workload="ip--172--31--26--227-k8s-whisker--744ff764b6--md9lk-eth0" Sep 13 00:48:16.341381 env[1726]: 2025-09-13 00:48:16.303 [INFO][5606] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e" HandleID="k8s-pod-network.2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e" Workload="ip--172--31--26--227-k8s-whisker--744ff764b6--md9lk-eth0" Sep 13 00:48:16.341381 env[1726]: 2025-09-13 00:48:16.322 [INFO][5606] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:48:16.341381 env[1726]: 2025-09-13 00:48:16.329 [INFO][5598] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e" Sep 13 00:48:16.344166 env[1726]: time="2025-09-13T00:48:16.341348057Z" level=info msg="TearDown network for sandbox \"2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e\" successfully" Sep 13 00:48:16.344166 env[1726]: time="2025-09-13T00:48:16.342396837Z" level=info msg="StopPodSandbox for \"2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e\" returns successfully" Sep 13 00:48:16.344166 env[1726]: time="2025-09-13T00:48:16.343418288Z" level=info msg="RemovePodSandbox for \"2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e\"" Sep 13 00:48:16.344166 env[1726]: time="2025-09-13T00:48:16.343455854Z" level=info msg="Forcibly stopping sandbox \"2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e\"" Sep 13 00:48:16.375466 sshd[5510]: pam_unix(sshd:session): session closed for user core Sep 13 00:48:16.406568 kernel: kauditd_printk_skb: 76 callbacks suppressed Sep 13 00:48:16.423766 kernel: audit: type=1106 audit(1757724496.389:1364): pid=5510 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:16.424398 kernel: audit: type=1104 audit(1757724496.390:1365): pid=5510 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:16.389000 audit[5510]: USER_END pid=5510 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:16.390000 audit[5510]: CRED_DISP pid=5510 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:16.394071 systemd[1]: sshd@12-172.31.26.227:22-147.75.109.163:54666.service: Deactivated successfully. Sep 13 00:48:16.393000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.26.227:22-147.75.109.163:54666 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:16.436688 kernel: audit: type=1131 audit(1757724496.393:1366): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.26.227:22-147.75.109.163:54666 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:16.395231 systemd[1]: session-9.scope: Deactivated successfully. Sep 13 00:48:16.421969 systemd-logind[1719]: Session 9 logged out. Waiting for processes to exit. Sep 13 00:48:16.424783 systemd-logind[1719]: Removed session 9. Sep 13 00:48:16.677393 env[1726]: 2025-09-13 00:48:16.548 [WARNING][5620] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e" WorkloadEndpoint="ip--172--31--26--227-k8s-whisker--744ff764b6--md9lk-eth0" Sep 13 00:48:16.677393 env[1726]: 2025-09-13 00:48:16.548 [INFO][5620] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e" Sep 13 00:48:16.677393 env[1726]: 2025-09-13 00:48:16.549 [INFO][5620] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e" iface="eth0" netns="" Sep 13 00:48:16.677393 env[1726]: 2025-09-13 00:48:16.549 [INFO][5620] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e" Sep 13 00:48:16.677393 env[1726]: 2025-09-13 00:48:16.549 [INFO][5620] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e" Sep 13 00:48:16.677393 env[1726]: 2025-09-13 00:48:16.636 [INFO][5629] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e" HandleID="k8s-pod-network.2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e" Workload="ip--172--31--26--227-k8s-whisker--744ff764b6--md9lk-eth0" Sep 13 00:48:16.677393 env[1726]: 2025-09-13 00:48:16.637 [INFO][5629] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:48:16.677393 env[1726]: 2025-09-13 00:48:16.637 [INFO][5629] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:48:16.677393 env[1726]: 2025-09-13 00:48:16.664 [WARNING][5629] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e" HandleID="k8s-pod-network.2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e" Workload="ip--172--31--26--227-k8s-whisker--744ff764b6--md9lk-eth0" Sep 13 00:48:16.677393 env[1726]: 2025-09-13 00:48:16.664 [INFO][5629] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e" HandleID="k8s-pod-network.2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e" Workload="ip--172--31--26--227-k8s-whisker--744ff764b6--md9lk-eth0" Sep 13 00:48:16.677393 env[1726]: 2025-09-13 00:48:16.671 [INFO][5629] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:48:16.677393 env[1726]: 2025-09-13 00:48:16.674 [INFO][5620] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e" Sep 13 00:48:16.679748 env[1726]: time="2025-09-13T00:48:16.677818898Z" level=info msg="TearDown network for sandbox \"2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e\" successfully" Sep 13 00:48:16.686687 env[1726]: time="2025-09-13T00:48:16.686637437Z" level=info msg="RemovePodSandbox \"2f9ee9d965d7501e5f070023cbc96c44a48cb4b23516e14433df04625281e95e\" returns successfully" Sep 13 00:48:16.687391 env[1726]: time="2025-09-13T00:48:16.687360355Z" level=info msg="StopPodSandbox for \"bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051\"" Sep 13 00:48:16.937873 env[1726]: 2025-09-13 00:48:16.822 [WARNING][5645] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--227-k8s-coredns--668d6bf9bc--rwnwd-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"9c1c985e-0356-4c2e-9ae2-014973546f81", ResourceVersion:"1019", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 47, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-227", ContainerID:"16b289c6afddb0f7dd4b58a5712f2b29f8e636328c835cc521c6af1cfc2bbea0", Pod:"coredns-668d6bf9bc-rwnwd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.43.71/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0125d8b26a4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:48:16.937873 env[1726]: 2025-09-13 00:48:16.822 [INFO][5645] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051" Sep 13 00:48:16.937873 env[1726]: 2025-09-13 00:48:16.822 [INFO][5645] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051" iface="eth0" netns="" Sep 13 00:48:16.937873 env[1726]: 2025-09-13 00:48:16.822 [INFO][5645] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051" Sep 13 00:48:16.937873 env[1726]: 2025-09-13 00:48:16.822 [INFO][5645] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051" Sep 13 00:48:16.937873 env[1726]: 2025-09-13 00:48:16.916 [INFO][5652] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051" HandleID="k8s-pod-network.bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051" Workload="ip--172--31--26--227-k8s-coredns--668d6bf9bc--rwnwd-eth0" Sep 13 00:48:16.937873 env[1726]: 2025-09-13 00:48:16.918 [INFO][5652] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:48:16.937873 env[1726]: 2025-09-13 00:48:16.918 [INFO][5652] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:48:16.937873 env[1726]: 2025-09-13 00:48:16.926 [WARNING][5652] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051" HandleID="k8s-pod-network.bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051" Workload="ip--172--31--26--227-k8s-coredns--668d6bf9bc--rwnwd-eth0" Sep 13 00:48:16.937873 env[1726]: 2025-09-13 00:48:16.926 [INFO][5652] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051" HandleID="k8s-pod-network.bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051" Workload="ip--172--31--26--227-k8s-coredns--668d6bf9bc--rwnwd-eth0" Sep 13 00:48:16.937873 env[1726]: 2025-09-13 00:48:16.930 [INFO][5652] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:48:16.937873 env[1726]: 2025-09-13 00:48:16.933 [INFO][5645] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051" Sep 13 00:48:16.940132 env[1726]: time="2025-09-13T00:48:16.939162351Z" level=info msg="TearDown network for sandbox \"bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051\" successfully" Sep 13 00:48:16.940132 env[1726]: time="2025-09-13T00:48:16.939255356Z" level=info msg="StopPodSandbox for \"bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051\" returns successfully" Sep 13 00:48:16.940666 env[1726]: time="2025-09-13T00:48:16.940406804Z" level=info msg="RemovePodSandbox for \"bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051\"" Sep 13 00:48:16.940852 env[1726]: time="2025-09-13T00:48:16.940776693Z" level=info msg="Forcibly stopping sandbox \"bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051\"" Sep 13 00:48:17.195723 env[1726]: 2025-09-13 00:48:17.065 [WARNING][5666] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--227-k8s-coredns--668d6bf9bc--rwnwd-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"9c1c985e-0356-4c2e-9ae2-014973546f81", ResourceVersion:"1019", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 47, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-227", ContainerID:"16b289c6afddb0f7dd4b58a5712f2b29f8e636328c835cc521c6af1cfc2bbea0", Pod:"coredns-668d6bf9bc-rwnwd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.43.71/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0125d8b26a4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:48:17.195723 env[1726]: 2025-09-13 00:48:17.065 [INFO][5666] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051" Sep 13 00:48:17.195723 env[1726]: 2025-09-13 00:48:17.065 [INFO][5666] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051" iface="eth0" netns="" Sep 13 00:48:17.195723 env[1726]: 2025-09-13 00:48:17.065 [INFO][5666] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051" Sep 13 00:48:17.195723 env[1726]: 2025-09-13 00:48:17.065 [INFO][5666] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051" Sep 13 00:48:17.195723 env[1726]: 2025-09-13 00:48:17.164 [INFO][5678] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051" HandleID="k8s-pod-network.bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051" Workload="ip--172--31--26--227-k8s-coredns--668d6bf9bc--rwnwd-eth0" Sep 13 00:48:17.195723 env[1726]: 2025-09-13 00:48:17.165 [INFO][5678] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:48:17.195723 env[1726]: 2025-09-13 00:48:17.165 [INFO][5678] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:48:17.195723 env[1726]: 2025-09-13 00:48:17.180 [WARNING][5678] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051" HandleID="k8s-pod-network.bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051" Workload="ip--172--31--26--227-k8s-coredns--668d6bf9bc--rwnwd-eth0" Sep 13 00:48:17.195723 env[1726]: 2025-09-13 00:48:17.180 [INFO][5678] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051" HandleID="k8s-pod-network.bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051" Workload="ip--172--31--26--227-k8s-coredns--668d6bf9bc--rwnwd-eth0" Sep 13 00:48:17.195723 env[1726]: 2025-09-13 00:48:17.188 [INFO][5678] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:48:17.195723 env[1726]: 2025-09-13 00:48:17.192 [INFO][5666] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051" Sep 13 00:48:17.198453 env[1726]: time="2025-09-13T00:48:17.196341420Z" level=info msg="TearDown network for sandbox \"bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051\" successfully" Sep 13 00:48:17.206704 env[1726]: time="2025-09-13T00:48:17.206653963Z" level=info msg="RemovePodSandbox \"bcef628d22b637e73bb817a71c17cdfab82889b959c6e64e182f27c532ce7051\" returns successfully" Sep 13 00:48:17.207407 env[1726]: time="2025-09-13T00:48:17.207374485Z" level=info msg="StopPodSandbox for \"a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a\"" Sep 13 00:48:17.515954 env[1726]: 2025-09-13 00:48:17.376 [WARNING][5692] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--227-k8s-csi--node--driver--gqprd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a9acc916-f8c5-498e-a936-eb42d96a2962", ResourceVersion:"1008", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 47, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-227", ContainerID:"d7227799eb3874307dfa9e5f46475ab3e4ec2f861c995e1b0f1d12f4e9434540", Pod:"csi-node-driver-gqprd", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.43.72/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calia40a73b1983", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:48:17.515954 env[1726]: 2025-09-13 00:48:17.376 [INFO][5692] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a" Sep 13 00:48:17.515954 env[1726]: 2025-09-13 00:48:17.376 [INFO][5692] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a" iface="eth0" netns="" Sep 13 00:48:17.515954 env[1726]: 2025-09-13 00:48:17.376 [INFO][5692] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a" Sep 13 00:48:17.515954 env[1726]: 2025-09-13 00:48:17.376 [INFO][5692] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a" Sep 13 00:48:17.515954 env[1726]: 2025-09-13 00:48:17.482 [INFO][5699] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a" HandleID="k8s-pod-network.a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a" Workload="ip--172--31--26--227-k8s-csi--node--driver--gqprd-eth0" Sep 13 00:48:17.515954 env[1726]: 2025-09-13 00:48:17.482 [INFO][5699] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:48:17.515954 env[1726]: 2025-09-13 00:48:17.482 [INFO][5699] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:48:17.515954 env[1726]: 2025-09-13 00:48:17.500 [WARNING][5699] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a" HandleID="k8s-pod-network.a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a" Workload="ip--172--31--26--227-k8s-csi--node--driver--gqprd-eth0" Sep 13 00:48:17.515954 env[1726]: 2025-09-13 00:48:17.500 [INFO][5699] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a" HandleID="k8s-pod-network.a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a" Workload="ip--172--31--26--227-k8s-csi--node--driver--gqprd-eth0" Sep 13 00:48:17.515954 env[1726]: 2025-09-13 00:48:17.504 [INFO][5699] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:48:17.515954 env[1726]: 2025-09-13 00:48:17.513 [INFO][5692] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a" Sep 13 00:48:17.518467 env[1726]: time="2025-09-13T00:48:17.516581984Z" level=info msg="TearDown network for sandbox \"a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a\" successfully" Sep 13 00:48:17.518467 env[1726]: time="2025-09-13T00:48:17.516624610Z" level=info msg="StopPodSandbox for \"a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a\" returns successfully" Sep 13 00:48:17.518809 env[1726]: time="2025-09-13T00:48:17.518774300Z" level=info msg="RemovePodSandbox for \"a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a\"" Sep 13 00:48:17.518961 env[1726]: time="2025-09-13T00:48:17.518914319Z" level=info msg="Forcibly stopping sandbox \"a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a\"" Sep 13 00:48:17.776955 env[1726]: 2025-09-13 00:48:17.649 [WARNING][5713] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--26--227-k8s-csi--node--driver--gqprd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a9acc916-f8c5-498e-a936-eb42d96a2962", ResourceVersion:"1008", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 47, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-26-227", ContainerID:"d7227799eb3874307dfa9e5f46475ab3e4ec2f861c995e1b0f1d12f4e9434540", Pod:"csi-node-driver-gqprd", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.43.72/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calia40a73b1983", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:48:17.776955 env[1726]: 2025-09-13 00:48:17.649 [INFO][5713] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a" Sep 13 00:48:17.776955 env[1726]: 2025-09-13 00:48:17.649 [INFO][5713] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a" iface="eth0" netns="" Sep 13 00:48:17.776955 env[1726]: 2025-09-13 00:48:17.649 [INFO][5713] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a" Sep 13 00:48:17.776955 env[1726]: 2025-09-13 00:48:17.650 [INFO][5713] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a" Sep 13 00:48:17.776955 env[1726]: 2025-09-13 00:48:17.739 [INFO][5720] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a" HandleID="k8s-pod-network.a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a" Workload="ip--172--31--26--227-k8s-csi--node--driver--gqprd-eth0" Sep 13 00:48:17.776955 env[1726]: 2025-09-13 00:48:17.739 [INFO][5720] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:48:17.776955 env[1726]: 2025-09-13 00:48:17.739 [INFO][5720] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:48:17.776955 env[1726]: 2025-09-13 00:48:17.762 [WARNING][5720] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a" HandleID="k8s-pod-network.a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a" Workload="ip--172--31--26--227-k8s-csi--node--driver--gqprd-eth0" Sep 13 00:48:17.776955 env[1726]: 2025-09-13 00:48:17.762 [INFO][5720] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a" HandleID="k8s-pod-network.a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a" Workload="ip--172--31--26--227-k8s-csi--node--driver--gqprd-eth0" Sep 13 00:48:17.776955 env[1726]: 2025-09-13 00:48:17.764 [INFO][5720] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:48:17.776955 env[1726]: 2025-09-13 00:48:17.767 [INFO][5713] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a" Sep 13 00:48:17.779934 env[1726]: time="2025-09-13T00:48:17.777382829Z" level=info msg="TearDown network for sandbox \"a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a\" successfully" Sep 13 00:48:17.791295 env[1726]: time="2025-09-13T00:48:17.791246870Z" level=info msg="RemovePodSandbox \"a2988c1b15ee53c708a51108d6889499f89d448656acc095d6ee06bc9e64a60a\" returns successfully" Sep 13 00:48:17.940347 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1158545688.mount: Deactivated successfully. Sep 13 00:48:17.969085 env[1726]: time="2025-09-13T00:48:17.969028294Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker-backend:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:17.973272 env[1726]: time="2025-09-13T00:48:17.973228874Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7e29b0984d517678aab6ca138482c318989f6f28daf9d3b5dd6e4a5a3115ac16,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:17.976587 env[1726]: time="2025-09-13T00:48:17.976529555Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/whisker-backend:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:17.982202 env[1726]: time="2025-09-13T00:48:17.982148285Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker-backend@sha256:29becebc47401da9997a2a30f4c25c511a5f379d17275680b048224829af71a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:17.983013 env[1726]: time="2025-09-13T00:48:17.982974056Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.3\" returns image reference \"sha256:7e29b0984d517678aab6ca138482c318989f6f28daf9d3b5dd6e4a5a3115ac16\"" Sep 13 00:48:18.144189 env[1726]: time="2025-09-13T00:48:18.144129466Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.3\"" Sep 13 00:48:18.251587 env[1726]: time="2025-09-13T00:48:18.251530141Z" level=info msg="CreateContainer within sandbox \"822724b1f27c183483b6c3b0a5ea01d2376c70f5f08c9f37b6cf4972fb8d0d6b\" for container &ContainerMetadata{Name:whisker-backend,Attempt:0,}" Sep 13 00:48:18.283957 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1158186574.mount: Deactivated successfully. Sep 13 00:48:18.288907 env[1726]: time="2025-09-13T00:48:18.288839721Z" level=info msg="CreateContainer within sandbox \"822724b1f27c183483b6c3b0a5ea01d2376c70f5f08c9f37b6cf4972fb8d0d6b\" for &ContainerMetadata{Name:whisker-backend,Attempt:0,} returns container id \"ba0feb12b61055385ae41979f03bb2796bf44729483dfc0ce4938db0339c13e2\"" Sep 13 00:48:18.294364 env[1726]: time="2025-09-13T00:48:18.294321581Z" level=info msg="StartContainer for \"ba0feb12b61055385ae41979f03bb2796bf44729483dfc0ce4938db0339c13e2\"" Sep 13 00:48:18.385574 systemd[1]: Started cri-containerd-ba0feb12b61055385ae41979f03bb2796bf44729483dfc0ce4938db0339c13e2.scope. Sep 13 00:48:18.458181 env[1726]: time="2025-09-13T00:48:18.458066850Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:18.469640 env[1726]: time="2025-09-13T00:48:18.469590376Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:879f2443aed0573271114108bfec35d3e76419f98282ef796c646d0986c5ba6a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:18.475178 env[1726]: time="2025-09-13T00:48:18.475133787Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:18.480336 env[1726]: time="2025-09-13T00:48:18.480287148Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:6a24147f11c1edce9d6ba79bdb0c2beadec53853fb43438a287291e67b41e51b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:18.481271 env[1726]: time="2025-09-13T00:48:18.481224072Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.3\" returns image reference \"sha256:879f2443aed0573271114108bfec35d3e76419f98282ef796c646d0986c5ba6a\"" Sep 13 00:48:18.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.521502 kernel: audit: type=1400 audit(1757724498.504:1367): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.522326 kernel: audit: type=1400 audit(1757724498.504:1368): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.523042 kernel: audit: type=1400 audit(1757724498.504:1369): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.534289 kernel: audit: type=1400 audit(1757724498.504:1370): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.550244 kernel: audit: type=1400 audit(1757724498.504:1371): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.550392 kernel: audit: type=1400 audit(1757724498.504:1372): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.558500 kernel: audit: type=1400 audit(1757724498.504:1373): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.519000 audit: BPF prog-id=220 op=LOAD Sep 13 00:48:18.526000 audit[5734]: AVC avc: denied { bpf } for pid=5734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.526000 audit[5734]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4358 pid=5734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:18.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261306665623132623631303535333835616534313937396630336262 Sep 13 00:48:18.526000 audit[5734]: AVC avc: denied { perfmon } for pid=5734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.526000 audit[5734]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4358 pid=5734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:18.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261306665623132623631303535333835616534313937396630336262 Sep 13 00:48:18.527000 audit[5734]: AVC avc: denied { bpf } for pid=5734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.527000 audit[5734]: AVC avc: denied { bpf } for pid=5734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.527000 audit[5734]: AVC avc: denied { bpf } for pid=5734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.527000 audit[5734]: AVC avc: denied { perfmon } for pid=5734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.527000 audit[5734]: AVC avc: denied { perfmon } for pid=5734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.527000 audit[5734]: AVC avc: denied { perfmon } for pid=5734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.527000 audit[5734]: AVC avc: denied { perfmon } for pid=5734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.527000 audit[5734]: AVC avc: denied { perfmon } for pid=5734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.527000 audit[5734]: AVC avc: denied { bpf } for pid=5734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.527000 audit[5734]: AVC avc: denied { bpf } for pid=5734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.527000 audit: BPF prog-id=221 op=LOAD Sep 13 00:48:18.527000 audit[5734]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003d8080 items=0 ppid=4358 pid=5734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:18.527000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261306665623132623631303535333835616534313937396630336262 Sep 13 00:48:18.567000 audit[5734]: AVC avc: denied { bpf } for pid=5734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.567000 audit[5734]: AVC avc: denied { bpf } for pid=5734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.567000 audit[5734]: AVC avc: denied { perfmon } for pid=5734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.567000 audit[5734]: AVC avc: denied { perfmon } for pid=5734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.567000 audit[5734]: AVC avc: denied { perfmon } for pid=5734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.567000 audit[5734]: AVC avc: denied { perfmon } for pid=5734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.567000 audit[5734]: AVC avc: denied { perfmon } for pid=5734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.567000 audit[5734]: AVC avc: denied { bpf } for pid=5734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.567000 audit[5734]: AVC avc: denied { bpf } for pid=5734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.567000 audit: BPF prog-id=222 op=LOAD Sep 13 00:48:18.567000 audit[5734]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000251f8 items=0 ppid=4358 pid=5734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:18.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261306665623132623631303535333835616534313937396630336262 Sep 13 00:48:18.567000 audit: BPF prog-id=222 op=UNLOAD Sep 13 00:48:18.567000 audit: BPF prog-id=221 op=UNLOAD Sep 13 00:48:18.567000 audit[5734]: AVC avc: denied { bpf } for pid=5734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.567000 audit[5734]: AVC avc: denied { bpf } for pid=5734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.567000 audit[5734]: AVC avc: denied { bpf } for pid=5734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.567000 audit[5734]: AVC avc: denied { perfmon } for pid=5734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.567000 audit[5734]: AVC avc: denied { perfmon } for pid=5734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.567000 audit[5734]: AVC avc: denied { perfmon } for pid=5734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.567000 audit[5734]: AVC avc: denied { perfmon } for pid=5734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.567000 audit[5734]: AVC avc: denied { perfmon } for pid=5734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.567000 audit[5734]: AVC avc: denied { bpf } for pid=5734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.567000 audit[5734]: AVC avc: denied { bpf } for pid=5734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.567000 audit: BPF prog-id=223 op=LOAD Sep 13 00:48:18.567000 audit[5734]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025608 items=0 ppid=4358 pid=5734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:18.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261306665623132623631303535333835616534313937396630336262 Sep 13 00:48:18.582111 env[1726]: time="2025-09-13T00:48:18.582045919Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.3\"" Sep 13 00:48:18.595423 env[1726]: time="2025-09-13T00:48:18.595371283Z" level=info msg="CreateContainer within sandbox \"d5b033a9f41ca9b9e35620f43a5cf0e836b873c77c5b0bf707d859712fd7ea36\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Sep 13 00:48:18.621244 env[1726]: time="2025-09-13T00:48:18.621098682Z" level=info msg="CreateContainer within sandbox \"d5b033a9f41ca9b9e35620f43a5cf0e836b873c77c5b0bf707d859712fd7ea36\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"61e298df8aa45e544fedf390786f52255923ae0da2166430273c1b0b4dcf7ae2\"" Sep 13 00:48:18.656599 env[1726]: time="2025-09-13T00:48:18.655419666Z" level=info msg="StartContainer for \"61e298df8aa45e544fedf390786f52255923ae0da2166430273c1b0b4dcf7ae2\"" Sep 13 00:48:18.679784 env[1726]: time="2025-09-13T00:48:18.679738789Z" level=info msg="StartContainer for \"ba0feb12b61055385ae41979f03bb2796bf44729483dfc0ce4938db0339c13e2\" returns successfully" Sep 13 00:48:18.707640 systemd[1]: Started cri-containerd-61e298df8aa45e544fedf390786f52255923ae0da2166430273c1b0b4dcf7ae2.scope. Sep 13 00:48:18.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.759000 audit: BPF prog-id=224 op=LOAD Sep 13 00:48:18.760000 audit[5768]: AVC avc: denied { bpf } for pid=5768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.760000 audit[5768]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4926 pid=5768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:18.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631653239386466386161343565353434666564663339303738366635 Sep 13 00:48:18.760000 audit[5768]: AVC avc: denied { perfmon } for pid=5768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.760000 audit[5768]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4926 pid=5768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:18.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631653239386466386161343565353434666564663339303738366635 Sep 13 00:48:18.760000 audit[5768]: AVC avc: denied { bpf } for pid=5768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.760000 audit[5768]: AVC avc: denied { bpf } for pid=5768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.760000 audit[5768]: AVC avc: denied { bpf } for pid=5768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.760000 audit[5768]: AVC avc: denied { perfmon } for pid=5768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.760000 audit[5768]: AVC avc: denied { perfmon } for pid=5768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.760000 audit[5768]: AVC avc: denied { perfmon } for pid=5768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.760000 audit[5768]: AVC avc: denied { perfmon } for pid=5768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.760000 audit[5768]: AVC avc: denied { perfmon } for pid=5768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.760000 audit[5768]: AVC avc: denied { bpf } for pid=5768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.760000 audit[5768]: AVC avc: denied { bpf } for pid=5768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.760000 audit: BPF prog-id=225 op=LOAD Sep 13 00:48:18.760000 audit[5768]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0000243a0 items=0 ppid=4926 pid=5768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:18.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631653239386466386161343565353434666564663339303738366635 Sep 13 00:48:18.760000 audit[5768]: AVC avc: denied { bpf } for pid=5768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.760000 audit[5768]: AVC avc: denied { bpf } for pid=5768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.760000 audit[5768]: AVC avc: denied { perfmon } for pid=5768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.760000 audit[5768]: AVC avc: denied { perfmon } for pid=5768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.760000 audit[5768]: AVC avc: denied { perfmon } for pid=5768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.760000 audit[5768]: AVC avc: denied { perfmon } for pid=5768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.760000 audit[5768]: AVC avc: denied { perfmon } for pid=5768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.760000 audit[5768]: AVC avc: denied { bpf } for pid=5768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.760000 audit[5768]: AVC avc: denied { bpf } for pid=5768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.760000 audit: BPF prog-id=226 op=LOAD Sep 13 00:48:18.760000 audit[5768]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000243e8 items=0 ppid=4926 pid=5768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:18.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631653239386466386161343565353434666564663339303738366635 Sep 13 00:48:18.760000 audit: BPF prog-id=226 op=UNLOAD Sep 13 00:48:18.760000 audit: BPF prog-id=225 op=UNLOAD Sep 13 00:48:18.760000 audit[5768]: AVC avc: denied { bpf } for pid=5768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.760000 audit[5768]: AVC avc: denied { bpf } for pid=5768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.760000 audit[5768]: AVC avc: denied { bpf } for pid=5768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.760000 audit[5768]: AVC avc: denied { perfmon } for pid=5768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.760000 audit[5768]: AVC avc: denied { perfmon } for pid=5768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.760000 audit[5768]: AVC avc: denied { perfmon } for pid=5768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.760000 audit[5768]: AVC avc: denied { perfmon } for pid=5768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.760000 audit[5768]: AVC avc: denied { perfmon } for pid=5768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.760000 audit[5768]: AVC avc: denied { bpf } for pid=5768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.760000 audit[5768]: AVC avc: denied { bpf } for pid=5768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:18.760000 audit: BPF prog-id=227 op=LOAD Sep 13 00:48:18.760000 audit[5768]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000247f8 items=0 ppid=4926 pid=5768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:18.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631653239386466386161343565353434666564663339303738366635 Sep 13 00:48:18.807025 env[1726]: time="2025-09-13T00:48:18.806971351Z" level=info msg="StartContainer for \"61e298df8aa45e544fedf390786f52255923ae0da2166430273c1b0b4dcf7ae2\" returns successfully" Sep 13 00:48:19.459220 kubelet[2611]: I0913 00:48:19.454205 2611 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/whisker-59b7b6cb85-k5tqr" podStartSLOduration=3.14269246 podStartE2EDuration="24.44386575s" podCreationTimestamp="2025-09-13 00:47:55 +0000 UTC" firstStartedPulling="2025-09-13 00:47:56.70528152 +0000 UTC m=+44.394395512" lastFinishedPulling="2025-09-13 00:48:18.006454808 +0000 UTC m=+65.695568802" observedRunningTime="2025-09-13 00:48:19.440483468 +0000 UTC m=+67.129597468" watchObservedRunningTime="2025-09-13 00:48:19.44386575 +0000 UTC m=+67.132979752" Sep 13 00:48:19.707000 audit[5803]: NETFILTER_CFG table=filter:122 family=2 entries=13 op=nft_register_rule pid=5803 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:48:19.707000 audit[5803]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffd33ba6ff0 a2=0 a3=7ffd33ba6fdc items=0 ppid=2978 pid=5803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.707000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:48:19.716000 audit[5803]: NETFILTER_CFG table=nat:123 family=2 entries=27 op=nft_register_chain pid=5803 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:48:19.716000 audit[5803]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd33ba6ff0 a2=0 a3=7ffd33ba6fdc items=0 ppid=2978 pid=5803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.716000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:48:19.861000 audit[5805]: NETFILTER_CFG table=filter:124 family=2 entries=12 op=nft_register_rule pid=5805 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:48:19.861000 audit[5805]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffe71c93ec0 a2=0 a3=7ffe71c93eac items=0 ppid=2978 pid=5805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.861000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:48:19.871000 audit[5805]: NETFILTER_CFG table=nat:125 family=2 entries=22 op=nft_register_rule pid=5805 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:48:19.871000 audit[5805]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe71c93ec0 a2=0 a3=7ffe71c93eac items=0 ppid=2978 pid=5805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:19.871000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:48:21.438207 kernel: kauditd_printk_skb: 119 callbacks suppressed Sep 13 00:48:21.444030 kernel: audit: type=1130 audit(1757724501.425:1407): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.26.227:22-147.75.109.163:47866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:21.425000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.26.227:22-147.75.109.163:47866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:21.423063 systemd[1]: Started sshd@13-172.31.26.227:22-147.75.109.163:47866.service. Sep 13 00:48:21.765000 audit[5812]: USER_ACCT pid=5812 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:21.778011 kernel: audit: type=1101 audit(1757724501.765:1408): pid=5812 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:21.778727 sshd[5812]: Accepted publickey for core from 147.75.109.163 port 47866 ssh2: RSA SHA256:9zKSfA0UBs4YCbMNRE+jf2SchYlhVPu6zl9tBdI5N0M Sep 13 00:48:21.775000 audit[5812]: CRED_ACQ pid=5812 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:21.779031 sshd[5812]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:48:21.790623 kernel: audit: type=1103 audit(1757724501.775:1409): pid=5812 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:21.813583 kernel: audit: type=1006 audit(1757724501.775:1410): pid=5812 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Sep 13 00:48:21.775000 audit[5812]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9bdef2e0 a2=3 a3=0 items=0 ppid=1 pid=5812 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:21.840091 kernel: audit: type=1300 audit(1757724501.775:1410): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9bdef2e0 a2=3 a3=0 items=0 ppid=1 pid=5812 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:21.835135 systemd[1]: Started session-10.scope. Sep 13 00:48:21.837762 systemd-logind[1719]: New session 10 of user core. Sep 13 00:48:21.851601 kernel: audit: type=1327 audit(1757724501.775:1410): proctitle=737368643A20636F7265205B707269765D Sep 13 00:48:21.775000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:48:21.871585 kernel: audit: type=1105 audit(1757724501.844:1411): pid=5812 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:21.844000 audit[5812]: USER_START pid=5812 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:21.879524 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount960559546.mount: Deactivated successfully. Sep 13 00:48:21.853000 audit[5814]: CRED_ACQ pid=5814 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:21.891887 kernel: audit: type=1103 audit(1757724501.853:1412): pid=5814 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:23.641365 env[1726]: time="2025-09-13T00:48:23.641317065Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/goldmane:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:23.686096 kernel: audit: type=1106 audit(1757724503.663:1413): pid=5812 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:23.696940 kernel: audit: type=1104 audit(1757724503.663:1414): pid=5812 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:23.663000 audit[5812]: USER_END pid=5812 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:23.663000 audit[5812]: CRED_DISP pid=5812 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:23.677000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.26.227:22-147.75.109.163:47866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:23.705149 env[1726]: time="2025-09-13T00:48:23.645839597Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a7d029fd8f6be94c26af980675c1650818e1e6e19dbd2f8c13e6e61963f021e8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:23.705149 env[1726]: time="2025-09-13T00:48:23.649798863Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/goldmane:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:23.705149 env[1726]: time="2025-09-13T00:48:23.654095773Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.3\" returns image reference \"sha256:a7d029fd8f6be94c26af980675c1650818e1e6e19dbd2f8c13e6e61963f021e8\"" Sep 13 00:48:23.705149 env[1726]: time="2025-09-13T00:48:23.654505405Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/goldmane@sha256:46297703ab3739331a00a58f0d6a5498c8d3b6523ad947eed68592ee0f3e79f0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:23.677119 systemd[1]: sshd@13-172.31.26.227:22-147.75.109.163:47866.service: Deactivated successfully. Sep 13 00:48:23.661313 sshd[5812]: pam_unix(sshd:session): session closed for user core Sep 13 00:48:23.679180 systemd[1]: session-10.scope: Deactivated successfully. Sep 13 00:48:23.682830 systemd-logind[1719]: Session 10 logged out. Waiting for processes to exit. Sep 13 00:48:23.701911 systemd[1]: Started sshd@14-172.31.26.227:22-147.75.109.163:47882.service. Sep 13 00:48:23.704584 systemd-logind[1719]: Removed session 10. Sep 13 00:48:23.702000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.26.227:22-147.75.109.163:47882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:23.848299 env[1726]: time="2025-09-13T00:48:23.848249934Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\"" Sep 13 00:48:23.938000 audit[5826]: USER_ACCT pid=5826 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:23.941702 sshd[5826]: Accepted publickey for core from 147.75.109.163 port 47882 ssh2: RSA SHA256:9zKSfA0UBs4YCbMNRE+jf2SchYlhVPu6zl9tBdI5N0M Sep 13 00:48:23.941000 audit[5826]: CRED_ACQ pid=5826 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:23.941000 audit[5826]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffefd4ac2e0 a2=3 a3=0 items=0 ppid=1 pid=5826 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:23.941000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:48:23.945979 sshd[5826]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:48:23.956569 systemd-logind[1719]: New session 11 of user core. Sep 13 00:48:23.956729 systemd[1]: Started session-11.scope. Sep 13 00:48:23.964000 audit[5826]: USER_START pid=5826 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:23.968000 audit[5828]: CRED_ACQ pid=5828 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:24.041051 env[1726]: time="2025-09-13T00:48:24.041005551Z" level=info msg="CreateContainer within sandbox \"9870e5e3afcdef073f5cd2d7b0aca7ef5ad2fa927f01b068251c11360409e173\" for container &ContainerMetadata{Name:goldmane,Attempt:0,}" Sep 13 00:48:24.114842 env[1726]: time="2025-09-13T00:48:24.114787156Z" level=info msg="CreateContainer within sandbox \"9870e5e3afcdef073f5cd2d7b0aca7ef5ad2fa927f01b068251c11360409e173\" for &ContainerMetadata{Name:goldmane,Attempt:0,} returns container id \"535e496c9cfa4debca57884c07ac3e953e24c4a98a2b9d734b6c389f56c3c5c8\"" Sep 13 00:48:24.221952 env[1726]: time="2025-09-13T00:48:24.221834243Z" level=info msg="StartContainer for \"535e496c9cfa4debca57884c07ac3e953e24c4a98a2b9d734b6c389f56c3c5c8\"" Sep 13 00:48:24.287377 systemd[1]: Started cri-containerd-535e496c9cfa4debca57884c07ac3e953e24c4a98a2b9d734b6c389f56c3c5c8.scope. Sep 13 00:48:24.318252 systemd[1]: run-containerd-runc-k8s.io-535e496c9cfa4debca57884c07ac3e953e24c4a98a2b9d734b6c389f56c3c5c8-runc.4GQvRi.mount: Deactivated successfully. Sep 13 00:48:24.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.454000 audit: BPF prog-id=228 op=LOAD Sep 13 00:48:24.455000 audit[5840]: AVC avc: denied { bpf } for pid=5840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.455000 audit[5840]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4978 pid=5840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:24.455000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533356534393663396366613464656263613537383834633037616333 Sep 13 00:48:24.455000 audit[5840]: AVC avc: denied { perfmon } for pid=5840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.455000 audit[5840]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4978 pid=5840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:24.455000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533356534393663396366613464656263613537383834633037616333 Sep 13 00:48:24.455000 audit[5840]: AVC avc: denied { bpf } for pid=5840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.455000 audit[5840]: AVC avc: denied { bpf } for pid=5840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.455000 audit[5840]: AVC avc: denied { bpf } for pid=5840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.455000 audit[5840]: AVC avc: denied { perfmon } for pid=5840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.455000 audit[5840]: AVC avc: denied { perfmon } for pid=5840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.455000 audit[5840]: AVC avc: denied { perfmon } for pid=5840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.455000 audit[5840]: AVC avc: denied { perfmon } for pid=5840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.455000 audit[5840]: AVC avc: denied { perfmon } for pid=5840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.455000 audit[5840]: AVC avc: denied { bpf } for pid=5840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.455000 audit[5840]: AVC avc: denied { bpf } for pid=5840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.455000 audit: BPF prog-id=229 op=LOAD Sep 13 00:48:24.455000 audit[5840]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003299a0 items=0 ppid=4978 pid=5840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:24.455000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533356534393663396366613464656263613537383834633037616333 Sep 13 00:48:24.455000 audit[5840]: AVC avc: denied { bpf } for pid=5840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.455000 audit[5840]: AVC avc: denied { bpf } for pid=5840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.455000 audit[5840]: AVC avc: denied { perfmon } for pid=5840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.455000 audit[5840]: AVC avc: denied { perfmon } for pid=5840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.455000 audit[5840]: AVC avc: denied { perfmon } for pid=5840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.455000 audit[5840]: AVC avc: denied { perfmon } for pid=5840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.455000 audit[5840]: AVC avc: denied { perfmon } for pid=5840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.455000 audit[5840]: AVC avc: denied { bpf } for pid=5840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.455000 audit[5840]: AVC avc: denied { bpf } for pid=5840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.455000 audit: BPF prog-id=230 op=LOAD Sep 13 00:48:24.455000 audit[5840]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003299e8 items=0 ppid=4978 pid=5840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:24.455000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533356534393663396366613464656263613537383834633037616333 Sep 13 00:48:24.455000 audit: BPF prog-id=230 op=UNLOAD Sep 13 00:48:24.455000 audit: BPF prog-id=229 op=UNLOAD Sep 13 00:48:24.455000 audit[5840]: AVC avc: denied { bpf } for pid=5840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.455000 audit[5840]: AVC avc: denied { bpf } for pid=5840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.455000 audit[5840]: AVC avc: denied { bpf } for pid=5840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.455000 audit[5840]: AVC avc: denied { perfmon } for pid=5840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.455000 audit[5840]: AVC avc: denied { perfmon } for pid=5840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.455000 audit[5840]: AVC avc: denied { perfmon } for pid=5840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.455000 audit[5840]: AVC avc: denied { perfmon } for pid=5840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.455000 audit[5840]: AVC avc: denied { perfmon } for pid=5840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.455000 audit[5840]: AVC avc: denied { bpf } for pid=5840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.455000 audit[5840]: AVC avc: denied { bpf } for pid=5840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:24.455000 audit: BPF prog-id=231 op=LOAD Sep 13 00:48:24.455000 audit[5840]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000329df8 items=0 ppid=4978 pid=5840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:24.455000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533356534393663396366613464656263613537383834633037616333 Sep 13 00:48:24.617115 env[1726]: time="2025-09-13T00:48:24.616324643Z" level=info msg="StartContainer for \"535e496c9cfa4debca57884c07ac3e953e24c4a98a2b9d734b6c389f56c3c5c8\" returns successfully" Sep 13 00:48:24.967236 sshd[5826]: pam_unix(sshd:session): session closed for user core Sep 13 00:48:24.973000 audit[5826]: USER_END pid=5826 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:24.974000 audit[5826]: CRED_DISP pid=5826 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:24.977595 systemd[1]: sshd@14-172.31.26.227:22-147.75.109.163:47882.service: Deactivated successfully. Sep 13 00:48:24.977000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.26.227:22-147.75.109.163:47882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:24.979506 systemd[1]: session-11.scope: Deactivated successfully. Sep 13 00:48:24.980421 systemd-logind[1719]: Session 11 logged out. Waiting for processes to exit. Sep 13 00:48:24.982152 systemd-logind[1719]: Removed session 11. Sep 13 00:48:24.993668 systemd[1]: Started sshd@15-172.31.26.227:22-147.75.109.163:47890.service. Sep 13 00:48:24.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.26.227:22-147.75.109.163:47890 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:25.186489 sshd[5490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.126.10.196 user=root Sep 13 00:48:25.186000 audit[5490]: USER_AUTH pid=5490 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.126.10.196 addr=101.126.10.196 terminal=ssh res=failed' Sep 13 00:48:25.213000 audit[5866]: USER_ACCT pid=5866 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:25.222862 sshd[5866]: Accepted publickey for core from 147.75.109.163 port 47890 ssh2: RSA SHA256:9zKSfA0UBs4YCbMNRE+jf2SchYlhVPu6zl9tBdI5N0M Sep 13 00:48:25.223000 audit[5866]: CRED_ACQ pid=5866 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:25.223000 audit[5866]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd88ffb790 a2=3 a3=0 items=0 ppid=1 pid=5866 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:25.223000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:48:25.226407 sshd[5866]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:48:25.245811 systemd[1]: Started session-12.scope. Sep 13 00:48:25.246927 systemd-logind[1719]: New session 12 of user core. Sep 13 00:48:25.260000 audit[5866]: USER_START pid=5866 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:25.262000 audit[5873]: CRED_ACQ pid=5873 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:25.797374 env[1726]: time="2025-09-13T00:48:25.797328626Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:25.810661 env[1726]: time="2025-09-13T00:48:25.810613792Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:666f4e02e75c30547109a06ed75b415a990a970811173aa741379cfaac4d9dd7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:25.821660 env[1726]: time="2025-09-13T00:48:25.821615835Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:25.828956 env[1726]: time="2025-09-13T00:48:25.828915551Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:f22c88018d8b58c4ef0052f594b216a13bd6852166ac131a538c5ab2fba23bb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:25.830068 env[1726]: time="2025-09-13T00:48:25.830022299Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\" returns image reference \"sha256:666f4e02e75c30547109a06ed75b415a990a970811173aa741379cfaac4d9dd7\"" Sep 13 00:48:26.006379 env[1726]: time="2025-09-13T00:48:26.006266793Z" level=info msg="CreateContainer within sandbox \"d7227799eb3874307dfa9e5f46475ab3e4ec2f861c995e1b0f1d12f4e9434540\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Sep 13 00:48:26.061086 env[1726]: time="2025-09-13T00:48:26.055104515Z" level=info msg="CreateContainer within sandbox \"d7227799eb3874307dfa9e5f46475ab3e4ec2f861c995e1b0f1d12f4e9434540\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"e8f3d5f47554d96e6b2534c3a52130a76181913147fb680c9e4d115a2f45b43b\"" Sep 13 00:48:26.060271 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1662845221.mount: Deactivated successfully. Sep 13 00:48:26.135577 env[1726]: time="2025-09-13T00:48:26.135513930Z" level=info msg="StartContainer for \"e8f3d5f47554d96e6b2534c3a52130a76181913147fb680c9e4d115a2f45b43b\"" Sep 13 00:48:26.226269 systemd[1]: run-containerd-runc-k8s.io-e8f3d5f47554d96e6b2534c3a52130a76181913147fb680c9e4d115a2f45b43b-runc.BibRJy.mount: Deactivated successfully. Sep 13 00:48:26.234387 systemd[1]: Started cri-containerd-e8f3d5f47554d96e6b2534c3a52130a76181913147fb680c9e4d115a2f45b43b.scope. Sep 13 00:48:26.330000 audit[5890]: AVC avc: denied { perfmon } for pid=5890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:26.330000 audit[5890]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fa2d245acc8 items=0 ppid=5152 pid=5890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:26.330000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538663364356634373535346439366536623235333463336135323133 Sep 13 00:48:26.330000 audit[5890]: AVC avc: denied { bpf } for pid=5890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:26.330000 audit[5890]: AVC avc: denied { bpf } for pid=5890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:26.330000 audit[5890]: AVC avc: denied { bpf } for pid=5890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:26.330000 audit[5890]: AVC avc: denied { perfmon } for pid=5890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:26.330000 audit[5890]: AVC avc: denied { perfmon } for pid=5890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:26.330000 audit[5890]: AVC avc: denied { perfmon } for pid=5890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:26.330000 audit[5890]: AVC avc: denied { perfmon } for pid=5890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:26.330000 audit[5890]: AVC avc: denied { perfmon } for pid=5890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:26.330000 audit[5890]: AVC avc: denied { bpf } for pid=5890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:26.330000 audit[5890]: AVC avc: denied { bpf } for pid=5890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:26.330000 audit: BPF prog-id=232 op=LOAD Sep 13 00:48:26.330000 audit[5890]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000348368 items=0 ppid=5152 pid=5890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:26.330000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538663364356634373535346439366536623235333463336135323133 Sep 13 00:48:26.330000 audit[5890]: AVC avc: denied { bpf } for pid=5890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:26.330000 audit[5890]: AVC avc: denied { bpf } for pid=5890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:26.330000 audit[5890]: AVC avc: denied { perfmon } for pid=5890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:26.330000 audit[5890]: AVC avc: denied { perfmon } for pid=5890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:26.330000 audit[5890]: AVC avc: denied { perfmon } for pid=5890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:26.330000 audit[5890]: AVC avc: denied { perfmon } for pid=5890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:26.330000 audit[5890]: AVC avc: denied { perfmon } for pid=5890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:26.330000 audit[5890]: AVC avc: denied { bpf } for pid=5890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:26.330000 audit[5890]: AVC avc: denied { bpf } for pid=5890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:26.330000 audit: BPF prog-id=233 op=LOAD Sep 13 00:48:26.330000 audit[5890]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003483b8 items=0 ppid=5152 pid=5890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:26.330000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538663364356634373535346439366536623235333463336135323133 Sep 13 00:48:26.331000 audit: BPF prog-id=233 op=UNLOAD Sep 13 00:48:26.331000 audit: BPF prog-id=232 op=UNLOAD Sep 13 00:48:26.331000 audit[5890]: AVC avc: denied { bpf } for pid=5890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:26.331000 audit[5890]: AVC avc: denied { bpf } for pid=5890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:26.331000 audit[5890]: AVC avc: denied { bpf } for pid=5890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:26.331000 audit[5890]: AVC avc: denied { perfmon } for pid=5890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:26.331000 audit[5890]: AVC avc: denied { perfmon } for pid=5890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:26.331000 audit[5890]: AVC avc: denied { perfmon } for pid=5890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:26.331000 audit[5890]: AVC avc: denied { perfmon } for pid=5890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:26.331000 audit[5890]: AVC avc: denied { perfmon } for pid=5890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:26.331000 audit[5890]: AVC avc: denied { bpf } for pid=5890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:26.331000 audit[5890]: AVC avc: denied { bpf } for pid=5890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:26.331000 audit: BPF prog-id=234 op=LOAD Sep 13 00:48:26.331000 audit[5890]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000348448 items=0 ppid=5152 pid=5890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:26.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538663364356634373535346439366536623235333463336135323133 Sep 13 00:48:26.378875 env[1726]: time="2025-09-13T00:48:26.359536178Z" level=info msg="StartContainer for \"e8f3d5f47554d96e6b2534c3a52130a76181913147fb680c9e4d115a2f45b43b\" returns successfully" Sep 13 00:48:26.466244 sshd[5866]: pam_unix(sshd:session): session closed for user core Sep 13 00:48:26.486000 audit[5866]: USER_END pid=5866 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:26.491674 kernel: kauditd_printk_skb: 121 callbacks suppressed Sep 13 00:48:26.492436 kernel: audit: type=1106 audit(1757724506.486:1456): pid=5866 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:26.498000 audit[5866]: CRED_DISP pid=5866 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:26.508583 kernel: audit: type=1104 audit(1757724506.498:1457): pid=5866 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:26.513402 kubelet[2611]: I0913 00:48:26.448840 2611 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-75d655b7b-65mmj" podStartSLOduration=40.937699422 podStartE2EDuration="56.113901957s" podCreationTimestamp="2025-09-13 00:47:30 +0000 UTC" firstStartedPulling="2025-09-13 00:48:03.371336944 +0000 UTC m=+51.060450936" lastFinishedPulling="2025-09-13 00:48:18.547539493 +0000 UTC m=+66.236653471" observedRunningTime="2025-09-13 00:48:19.512225893 +0000 UTC m=+67.201339895" watchObservedRunningTime="2025-09-13 00:48:26.113901957 +0000 UTC m=+73.803015964" Sep 13 00:48:26.547537 kernel: audit: type=1131 audit(1757724506.521:1458): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.26.227:22-147.75.109.163:47890 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:26.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.26.227:22-147.75.109.163:47890 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:26.521639 systemd[1]: sshd@15-172.31.26.227:22-147.75.109.163:47890.service: Deactivated successfully. Sep 13 00:48:26.522732 systemd[1]: session-12.scope: Deactivated successfully. Sep 13 00:48:26.531921 systemd-logind[1719]: Session 12 logged out. Waiting for processes to exit. Sep 13 00:48:26.537780 systemd-logind[1719]: Removed session 12. Sep 13 00:48:26.606000 audit[5920]: NETFILTER_CFG table=filter:126 family=2 entries=12 op=nft_register_rule pid=5920 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:48:26.613562 kernel: audit: type=1325 audit(1757724506.606:1459): table=filter:126 family=2 entries=12 op=nft_register_rule pid=5920 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:48:26.606000 audit[5920]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffe3decbb00 a2=0 a3=7ffe3decbaec items=0 ppid=2978 pid=5920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:26.626887 kernel: audit: type=1300 audit(1757724506.606:1459): arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffe3decbb00 a2=0 a3=7ffe3decbaec items=0 ppid=2978 pid=5920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:26.632992 kernel: audit: type=1327 audit(1757724506.606:1459): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:48:26.606000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:48:26.631000 audit[5920]: NETFILTER_CFG table=nat:127 family=2 entries=22 op=nft_register_rule pid=5920 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:48:26.637973 kernel: audit: type=1325 audit(1757724506.631:1460): table=nat:127 family=2 entries=22 op=nft_register_rule pid=5920 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:48:26.649498 kernel: audit: type=1300 audit(1757724506.631:1460): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe3decbb00 a2=0 a3=7ffe3decbaec items=0 ppid=2978 pid=5920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:26.631000 audit[5920]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe3decbb00 a2=0 a3=7ffe3decbaec items=0 ppid=2978 pid=5920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:26.631000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:48:26.655570 kernel: audit: type=1327 audit(1757724506.631:1460): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:48:26.719105 kubelet[2611]: I0913 00:48:26.719024 2611 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/goldmane-54d579b49d-krd8k" podStartSLOduration=33.666017299 podStartE2EDuration="53.718992782s" podCreationTimestamp="2025-09-13 00:47:33 +0000 UTC" firstStartedPulling="2025-09-13 00:48:03.673318484 +0000 UTC m=+51.362432477" lastFinishedPulling="2025-09-13 00:48:23.726293959 +0000 UTC m=+71.415407960" observedRunningTime="2025-09-13 00:48:26.074488804 +0000 UTC m=+73.763602807" watchObservedRunningTime="2025-09-13 00:48:26.718992782 +0000 UTC m=+74.408106782" Sep 13 00:48:26.721928 env[1726]: time="2025-09-13T00:48:26.721880678Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\"" Sep 13 00:48:27.014926 sshd[5490]: Failed password for root from 101.126.10.196 port 60432 ssh2 Sep 13 00:48:27.541008 sshd[5490]: Connection closed by authenticating user root 101.126.10.196 port 60432 [preauth] Sep 13 00:48:27.546000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.26.227:22-101.126.10.196:60432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:27.556155 kernel: audit: type=1131 audit(1757724507.546:1461): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.26.227:22-101.126.10.196:60432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:27.546190 systemd[1]: sshd@11-172.31.26.227:22-101.126.10.196:60432.service: Deactivated successfully. Sep 13 00:48:27.654000 audit[5780]: AVC avc: denied { watch } for pid=5780 comm="apiserver" path="/calico-apiserver-certs/..2025_09_13_00_47_44.2244096695/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c543 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c543 tclass=file permissive=0 Sep 13 00:48:27.654000 audit[5780]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001015260 a2=fc6 a3=0 items=0 ppid=4926 pid=5780 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c543 key=(null) Sep 13 00:48:27.654000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 13 00:48:27.745487 systemd[1]: Started sshd@16-172.31.26.227:22-101.126.10.196:34998.service. Sep 13 00:48:27.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.26.227:22-101.126.10.196:34998 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:28.062502 systemd[1]: run-containerd-runc-k8s.io-535e496c9cfa4debca57884c07ac3e953e24c4a98a2b9d734b6c389f56c3c5c8-runc.uonuLN.mount: Deactivated successfully. Sep 13 00:48:28.896652 env[1726]: time="2025-09-13T00:48:28.896600348Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:28.905433 env[1726]: time="2025-09-13T00:48:28.905382213Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b8f31c4fdaed3fa08af64de3d37d65a4c2ea0d9f6f522cb60d2e0cb424f8dd8a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:28.909475 env[1726]: time="2025-09-13T00:48:28.909428281Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:28.912589 env[1726]: time="2025-09-13T00:48:28.912531878Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:731ab232ca708102ab332340b1274d5cd656aa896ecc5368ee95850b811df86f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:48:28.913415 env[1726]: time="2025-09-13T00:48:28.913379273Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\" returns image reference \"sha256:b8f31c4fdaed3fa08af64de3d37d65a4c2ea0d9f6f522cb60d2e0cb424f8dd8a\"" Sep 13 00:48:29.060251 env[1726]: time="2025-09-13T00:48:29.060083048Z" level=info msg="CreateContainer within sandbox \"d7227799eb3874307dfa9e5f46475ab3e4ec2f861c995e1b0f1d12f4e9434540\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Sep 13 00:48:29.091284 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3661810233.mount: Deactivated successfully. Sep 13 00:48:29.097358 env[1726]: time="2025-09-13T00:48:29.097295850Z" level=info msg="CreateContainer within sandbox \"d7227799eb3874307dfa9e5f46475ab3e4ec2f861c995e1b0f1d12f4e9434540\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"f3726a20fde2e956c8293dde8d8f2f349537af161fc5ad5a5e95a1ac5b7bf5ec\"" Sep 13 00:48:29.099591 env[1726]: time="2025-09-13T00:48:29.098377365Z" level=info msg="StartContainer for \"f3726a20fde2e956c8293dde8d8f2f349537af161fc5ad5a5e95a1ac5b7bf5ec\"" Sep 13 00:48:29.141734 systemd[1]: Started cri-containerd-f3726a20fde2e956c8293dde8d8f2f349537af161fc5ad5a5e95a1ac5b7bf5ec.scope. Sep 13 00:48:29.224000 audit[5974]: AVC avc: denied { perfmon } for pid=5974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:29.224000 audit[5974]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f7d5534b5f8 items=0 ppid=5152 pid=5974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:29.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633373236613230666465326539353663383239336464653864386632 Sep 13 00:48:29.225000 audit[5974]: AVC avc: denied { bpf } for pid=5974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:29.225000 audit[5974]: AVC avc: denied { bpf } for pid=5974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:29.225000 audit[5974]: AVC avc: denied { bpf } for pid=5974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:29.225000 audit[5974]: AVC avc: denied { perfmon } for pid=5974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:29.225000 audit[5974]: AVC avc: denied { perfmon } for pid=5974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:29.225000 audit[5974]: AVC avc: denied { perfmon } for pid=5974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:29.225000 audit[5974]: AVC avc: denied { perfmon } for pid=5974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:29.225000 audit[5974]: AVC avc: denied { perfmon } for pid=5974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:29.225000 audit[5974]: AVC avc: denied { bpf } for pid=5974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:29.225000 audit[5974]: AVC avc: denied { bpf } for pid=5974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:29.225000 audit: BPF prog-id=235 op=LOAD Sep 13 00:48:29.225000 audit[5974]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002389b8 items=0 ppid=5152 pid=5974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:29.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633373236613230666465326539353663383239336464653864386632 Sep 13 00:48:29.225000 audit[5974]: AVC avc: denied { bpf } for pid=5974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:29.225000 audit[5974]: AVC avc: denied { bpf } for pid=5974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:29.225000 audit[5974]: AVC avc: denied { perfmon } for pid=5974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:29.225000 audit[5974]: AVC avc: denied { perfmon } for pid=5974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:29.225000 audit[5974]: AVC avc: denied { perfmon } for pid=5974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:29.225000 audit[5974]: AVC avc: denied { perfmon } for pid=5974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:29.225000 audit[5974]: AVC avc: denied { perfmon } for pid=5974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:29.225000 audit[5974]: AVC avc: denied { bpf } for pid=5974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:29.225000 audit[5974]: AVC avc: denied { bpf } for pid=5974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:29.225000 audit: BPF prog-id=236 op=LOAD Sep 13 00:48:29.225000 audit[5974]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000238a08 items=0 ppid=5152 pid=5974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:29.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633373236613230666465326539353663383239336464653864386632 Sep 13 00:48:29.225000 audit: BPF prog-id=236 op=UNLOAD Sep 13 00:48:29.225000 audit: BPF prog-id=235 op=UNLOAD Sep 13 00:48:29.225000 audit[5974]: AVC avc: denied { bpf } for pid=5974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:29.225000 audit[5974]: AVC avc: denied { bpf } for pid=5974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:29.225000 audit[5974]: AVC avc: denied { bpf } for pid=5974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:29.225000 audit[5974]: AVC avc: denied { perfmon } for pid=5974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:29.225000 audit[5974]: AVC avc: denied { perfmon } for pid=5974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:29.225000 audit[5974]: AVC avc: denied { perfmon } for pid=5974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:29.225000 audit[5974]: AVC avc: denied { perfmon } for pid=5974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:29.225000 audit[5974]: AVC avc: denied { perfmon } for pid=5974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:29.225000 audit[5974]: AVC avc: denied { bpf } for pid=5974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:29.225000 audit[5974]: AVC avc: denied { bpf } for pid=5974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:48:29.225000 audit: BPF prog-id=237 op=LOAD Sep 13 00:48:29.225000 audit[5974]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000238a98 items=0 ppid=5152 pid=5974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:29.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633373236613230666465326539353663383239336464653864386632 Sep 13 00:48:29.253020 env[1726]: time="2025-09-13T00:48:29.252965089Z" level=info msg="StartContainer for \"f3726a20fde2e956c8293dde8d8f2f349537af161fc5ad5a5e95a1ac5b7bf5ec\" returns successfully" Sep 13 00:48:29.255680 sshd[5946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.126.10.196 user=root Sep 13 00:48:29.255000 audit[5946]: ANOM_LOGIN_FAILURES pid=5946 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:29.255000 audit[5946]: USER_AUTH pid=5946 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.126.10.196 addr=101.126.10.196 terminal=ssh res=failed' Sep 13 00:48:29.255848 sshd[5946]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Sep 13 00:48:29.954842 kubelet[2611]: I0913 00:48:29.940883 2611 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-gqprd" podStartSLOduration=32.241369284 podStartE2EDuration="56.926628299s" podCreationTimestamp="2025-09-13 00:47:33 +0000 UTC" firstStartedPulling="2025-09-13 00:48:04.239371957 +0000 UTC m=+51.928485948" lastFinishedPulling="2025-09-13 00:48:28.924630969 +0000 UTC m=+76.613744963" observedRunningTime="2025-09-13 00:48:29.908230878 +0000 UTC m=+77.597344879" watchObservedRunningTime="2025-09-13 00:48:29.926628299 +0000 UTC m=+77.615742300" Sep 13 00:48:30.083558 systemd[1]: run-containerd-runc-k8s.io-f3726a20fde2e956c8293dde8d8f2f349537af161fc5ad5a5e95a1ac5b7bf5ec-runc.iurSy5.mount: Deactivated successfully. Sep 13 00:48:30.148022 kubelet[2611]: I0913 00:48:30.147973 2611 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Sep 13 00:48:30.150038 kubelet[2611]: I0913 00:48:30.150007 2611 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Sep 13 00:48:30.734902 kubelet[2611]: I0913 00:48:30.734846 2611 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Sep 13 00:48:31.182000 audit[6006]: NETFILTER_CFG table=filter:128 family=2 entries=11 op=nft_register_rule pid=6006 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:48:31.182000 audit[6006]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff148d9e20 a2=0 a3=7fff148d9e0c items=0 ppid=2978 pid=6006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:31.182000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:48:31.189000 audit[6006]: NETFILTER_CFG table=nat:129 family=2 entries=29 op=nft_register_chain pid=6006 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:48:31.189000 audit[6006]: SYSCALL arch=c000003e syscall=46 success=yes exit=10116 a0=3 a1=7fff148d9e20 a2=0 a3=7fff148d9e0c items=0 ppid=2978 pid=6006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:31.189000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:48:31.300284 sshd[5946]: Failed password for root from 101.126.10.196 port 34998 ssh2 Sep 13 00:48:31.486404 systemd[1]: Started sshd@17-172.31.26.227:22-147.75.109.163:47416.service. Sep 13 00:48:31.486000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.26.227:22-147.75.109.163:47416 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:31.613534 sshd[5946]: Connection closed by authenticating user root 101.126.10.196 port 34998 [preauth] Sep 13 00:48:31.619364 kernel: kauditd_printk_skb: 56 callbacks suppressed Sep 13 00:48:31.631327 kernel: audit: type=1131 audit(1757724511.613:1475): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.26.227:22-101.126.10.196:34998 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:31.613000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.26.227:22-101.126.10.196:34998 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:31.613942 systemd[1]: sshd@16-172.31.26.227:22-101.126.10.196:34998.service: Deactivated successfully. Sep 13 00:48:31.800900 systemd[1]: Started sshd@18-172.31.26.227:22-101.126.10.196:54278.service. Sep 13 00:48:31.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.26.227:22-101.126.10.196:54278 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:31.814671 kernel: audit: type=1130 audit(1757724511.800:1476): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.26.227:22-101.126.10.196:54278 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:31.840034 sshd[6008]: Accepted publickey for core from 147.75.109.163 port 47416 ssh2: RSA SHA256:9zKSfA0UBs4YCbMNRE+jf2SchYlhVPu6zl9tBdI5N0M Sep 13 00:48:31.839000 audit[6008]: USER_ACCT pid=6008 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:31.887204 kernel: audit: type=1101 audit(1757724511.839:1477): pid=6008 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:31.887338 kernel: audit: type=1103 audit(1757724511.868:1478): pid=6008 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:31.868000 audit[6008]: CRED_ACQ pid=6008 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:31.900137 kernel: audit: type=1006 audit(1757724511.868:1479): pid=6008 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Sep 13 00:48:31.868000 audit[6008]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd83dcf030 a2=3 a3=0 items=0 ppid=1 pid=6008 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:31.924670 kernel: audit: type=1300 audit(1757724511.868:1479): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd83dcf030 a2=3 a3=0 items=0 ppid=1 pid=6008 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:31.924771 kernel: audit: type=1327 audit(1757724511.868:1479): proctitle=737368643A20636F7265205B707269765D Sep 13 00:48:31.868000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:48:31.904070 sshd[6008]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:48:31.945237 systemd[1]: Started session-13.scope. Sep 13 00:48:31.947272 systemd-logind[1719]: New session 13 of user core. Sep 13 00:48:31.959000 audit[6008]: USER_START pid=6008 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:31.970672 kernel: audit: type=1105 audit(1757724511.959:1480): pid=6008 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:31.970000 audit[6014]: CRED_ACQ pid=6014 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:31.979654 kernel: audit: type=1103 audit(1757724511.970:1481): pid=6014 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:32.854418 sshd[6012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.126.10.196 user=root Sep 13 00:48:32.854000 audit[6012]: USER_AUTH pid=6012 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.126.10.196 addr=101.126.10.196 terminal=ssh res=failed' Sep 13 00:48:32.869693 kernel: audit: type=1100 audit(1757724512.854:1482): pid=6012 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.126.10.196 addr=101.126.10.196 terminal=ssh res=failed' Sep 13 00:48:33.883219 kubelet[2611]: E0913 00:48:33.881209 2611 kubelet.go:2573] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="1.29s" Sep 13 00:48:34.470289 sshd[6008]: pam_unix(sshd:session): session closed for user core Sep 13 00:48:34.474000 audit[6008]: USER_END pid=6008 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:34.478000 audit[6008]: CRED_DISP pid=6008 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:34.503182 systemd[1]: sshd@17-172.31.26.227:22-147.75.109.163:47416.service: Deactivated successfully. Sep 13 00:48:34.505000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.26.227:22-147.75.109.163:47416 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:34.507179 systemd[1]: session-13.scope: Deactivated successfully. Sep 13 00:48:34.512970 systemd-logind[1719]: Session 13 logged out. Waiting for processes to exit. Sep 13 00:48:34.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.26.227:22-147.75.109.163:47422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:34.518320 systemd[1]: Started sshd@19-172.31.26.227:22-147.75.109.163:47422.service. Sep 13 00:48:34.520374 systemd-logind[1719]: Removed session 13. Sep 13 00:48:34.639869 sshd[6012]: Failed password for root from 101.126.10.196 port 54278 ssh2 Sep 13 00:48:34.737000 audit[6047]: USER_ACCT pid=6047 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:34.739000 audit[6047]: CRED_ACQ pid=6047 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:34.739000 audit[6047]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd98ac6650 a2=3 a3=0 items=0 ppid=1 pid=6047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:34.739000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:48:34.753518 sshd[6047]: Accepted publickey for core from 147.75.109.163 port 47422 ssh2: RSA SHA256:9zKSfA0UBs4YCbMNRE+jf2SchYlhVPu6zl9tBdI5N0M Sep 13 00:48:34.742862 sshd[6047]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:48:34.763465 systemd[1]: Started session-14.scope. Sep 13 00:48:34.765265 systemd-logind[1719]: New session 14 of user core. Sep 13 00:48:34.776000 audit[6047]: USER_START pid=6047 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:34.783000 audit[6049]: CRED_ACQ pid=6049 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:35.209740 sshd[6012]: Connection closed by authenticating user root 101.126.10.196 port 54278 [preauth] Sep 13 00:48:35.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.26.227:22-101.126.10.196:54278 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:35.212214 systemd[1]: sshd@18-172.31.26.227:22-101.126.10.196:54278.service: Deactivated successfully. Sep 13 00:48:36.476992 systemd[1]: Started sshd@20-172.31.26.227:22-101.126.10.196:54280.service. Sep 13 00:48:36.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.26.227:22-101.126.10.196:54280 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:39.984413 update_engine[1720]: I0913 00:48:39.983327 1720 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Sep 13 00:48:39.984413 update_engine[1720]: I0913 00:48:39.984341 1720 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Sep 13 00:48:39.989576 update_engine[1720]: I0913 00:48:39.989128 1720 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Sep 13 00:48:39.991033 update_engine[1720]: I0913 00:48:39.990950 1720 omaha_request_params.cc:62] Current group set to lts Sep 13 00:48:39.998496 update_engine[1720]: I0913 00:48:39.998242 1720 update_attempter.cc:499] Already updated boot flags. Skipping. Sep 13 00:48:39.998496 update_engine[1720]: I0913 00:48:39.998267 1720 update_attempter.cc:643] Scheduling an action processor start. Sep 13 00:48:39.998496 update_engine[1720]: I0913 00:48:39.998293 1720 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Sep 13 00:48:40.000387 update_engine[1720]: I0913 00:48:40.000201 1720 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Sep 13 00:48:40.000387 update_engine[1720]: I0913 00:48:40.000319 1720 omaha_request_action.cc:270] Posting an Omaha request to disabled Sep 13 00:48:40.000387 update_engine[1720]: I0913 00:48:40.000325 1720 omaha_request_action.cc:271] Request: Sep 13 00:48:40.000387 update_engine[1720]: Sep 13 00:48:40.000387 update_engine[1720]: Sep 13 00:48:40.000387 update_engine[1720]: Sep 13 00:48:40.000387 update_engine[1720]: Sep 13 00:48:40.000387 update_engine[1720]: Sep 13 00:48:40.000387 update_engine[1720]: Sep 13 00:48:40.000387 update_engine[1720]: Sep 13 00:48:40.000387 update_engine[1720]: Sep 13 00:48:40.000387 update_engine[1720]: I0913 00:48:40.000334 1720 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Sep 13 00:48:40.019017 update_engine[1720]: I0913 00:48:40.018705 1720 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Sep 13 00:48:40.019017 update_engine[1720]: I0913 00:48:40.018967 1720 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Sep 13 00:48:40.043322 update_engine[1720]: E0913 00:48:40.043232 1720 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Sep 13 00:48:40.044500 update_engine[1720]: I0913 00:48:40.044456 1720 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Sep 13 00:48:40.055289 locksmithd[1797]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Sep 13 00:48:43.441287 sshd[6047]: pam_unix(sshd:session): session closed for user core Sep 13 00:48:43.467000 audit[6047]: USER_END pid=6047 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:43.487811 kernel: kauditd_printk_skb: 13 callbacks suppressed Sep 13 00:48:43.491235 kernel: audit: type=1106 audit(1757724523.467:1494): pid=6047 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:43.493848 kernel: audit: type=1104 audit(1757724523.470:1495): pid=6047 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:43.493922 kernel: audit: type=1130 audit(1757724523.481:1496): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.26.227:22-147.75.109.163:42762 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:43.470000 audit[6047]: CRED_DISP pid=6047 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:43.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.26.227:22-147.75.109.163:42762 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:43.483692 systemd[1]: Started sshd@21-172.31.26.227:22-147.75.109.163:42762.service. Sep 13 00:48:43.487093 systemd[1]: sshd@19-172.31.26.227:22-147.75.109.163:47422.service: Deactivated successfully. Sep 13 00:48:43.489918 systemd[1]: session-14.scope: Deactivated successfully. Sep 13 00:48:43.493239 systemd-logind[1719]: Session 14 logged out. Waiting for processes to exit. Sep 13 00:48:43.496374 systemd-logind[1719]: Removed session 14. Sep 13 00:48:43.481000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.26.227:22-147.75.109.163:47422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:43.516739 kernel: audit: type=1131 audit(1757724523.481:1497): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.26.227:22-147.75.109.163:47422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:43.727000 audit[6087]: USER_ACCT pid=6087 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:43.736079 sshd[6087]: Accepted publickey for core from 147.75.109.163 port 42762 ssh2: RSA SHA256:9zKSfA0UBs4YCbMNRE+jf2SchYlhVPu6zl9tBdI5N0M Sep 13 00:48:43.745678 kernel: audit: type=1101 audit(1757724523.727:1498): pid=6087 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:43.745763 kernel: audit: type=1103 audit(1757724523.727:1499): pid=6087 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:43.750922 kernel: audit: type=1006 audit(1757724523.727:1500): pid=6087 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Sep 13 00:48:43.727000 audit[6087]: CRED_ACQ pid=6087 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:43.737430 sshd[6087]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:48:43.727000 audit[6087]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3307a990 a2=3 a3=0 items=0 ppid=1 pid=6087 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:43.760528 kernel: audit: type=1300 audit(1757724523.727:1500): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3307a990 a2=3 a3=0 items=0 ppid=1 pid=6087 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:43.727000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:48:43.766640 kernel: audit: type=1327 audit(1757724523.727:1500): proctitle=737368643A20636F7265205B707269765D Sep 13 00:48:43.771003 systemd-logind[1719]: New session 15 of user core. Sep 13 00:48:43.771771 systemd[1]: Started session-15.scope. Sep 13 00:48:43.776000 audit[6087]: USER_START pid=6087 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:43.776000 audit[6090]: CRED_ACQ pid=6090 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:43.787688 kernel: audit: type=1105 audit(1757724523.776:1501): pid=6087 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:44.052805 systemd[1]: run-containerd-runc-k8s.io-1eed56009ba23edec9eccbcbd858431b2712595fa1dc76b77a553b20c735b507-runc.ORLANw.mount: Deactivated successfully. Sep 13 00:48:45.688654 sshd[6087]: pam_unix(sshd:session): session closed for user core Sep 13 00:48:45.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.26.227:22-147.75.109.163:42770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:45.740000 audit[6087]: USER_END pid=6087 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:45.741000 audit[6087]: CRED_DISP pid=6087 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:45.743000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.26.227:22-147.75.109.163:42762 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:45.731161 systemd[1]: Started sshd@22-172.31.26.227:22-147.75.109.163:42770.service. Sep 13 00:48:45.743979 systemd[1]: sshd@21-172.31.26.227:22-147.75.109.163:42762.service: Deactivated successfully. Sep 13 00:48:45.745183 systemd[1]: session-15.scope: Deactivated successfully. Sep 13 00:48:45.748236 systemd-logind[1719]: Session 15 logged out. Waiting for processes to exit. Sep 13 00:48:45.752686 systemd-logind[1719]: Removed session 15. Sep 13 00:48:45.924000 audit[6124]: NETFILTER_CFG table=filter:130 family=2 entries=22 op=nft_register_rule pid=6124 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:48:45.924000 audit[6124]: SYSCALL arch=c000003e syscall=46 success=yes exit=12688 a0=3 a1=7ffef4b9bec0 a2=0 a3=7ffef4b9beac items=0 ppid=2978 pid=6124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:45.924000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:48:45.933000 audit[6124]: NETFILTER_CFG table=nat:131 family=2 entries=24 op=nft_register_rule pid=6124 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:48:45.933000 audit[6124]: SYSCALL arch=c000003e syscall=46 success=yes exit=7308 a0=3 a1=7ffef4b9bec0 a2=0 a3=0 items=0 ppid=2978 pid=6124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:45.933000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:48:45.975000 audit[6126]: NETFILTER_CFG table=filter:132 family=2 entries=34 op=nft_register_rule pid=6126 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:48:45.975000 audit[6126]: SYSCALL arch=c000003e syscall=46 success=yes exit=12688 a0=3 a1=7fffdbba6b60 a2=0 a3=7fffdbba6b4c items=0 ppid=2978 pid=6126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:45.975000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:48:45.979000 audit[6126]: NETFILTER_CFG table=nat:133 family=2 entries=24 op=nft_register_rule pid=6126 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:48:45.979000 audit[6126]: SYSCALL arch=c000003e syscall=46 success=yes exit=7308 a0=3 a1=7fffdbba6b60 a2=0 a3=0 items=0 ppid=2978 pid=6126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:45.979000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:48:46.001000 audit[6120]: USER_ACCT pid=6120 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:46.002695 sshd[6120]: Accepted publickey for core from 147.75.109.163 port 42770 ssh2: RSA SHA256:9zKSfA0UBs4YCbMNRE+jf2SchYlhVPu6zl9tBdI5N0M Sep 13 00:48:46.003000 audit[6120]: CRED_ACQ pid=6120 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:46.004000 audit[6120]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc07125330 a2=3 a3=0 items=0 ppid=1 pid=6120 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:46.004000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:48:46.006202 sshd[6120]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:48:46.025429 systemd-logind[1719]: New session 16 of user core. Sep 13 00:48:46.026882 systemd[1]: Started session-16.scope. Sep 13 00:48:46.033000 audit[6120]: USER_START pid=6120 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:46.035000 audit[6127]: CRED_ACQ pid=6127 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:48.376067 sshd[6120]: pam_unix(sshd:session): session closed for user core Sep 13 00:48:48.436000 audit[6120]: USER_END pid=6120 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:48.440000 audit[6120]: CRED_DISP pid=6120 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:48.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.26.227:22-147.75.109.163:42772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:48.450000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.26.227:22-147.75.109.163:42770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:48.450228 systemd[1]: Started sshd@23-172.31.26.227:22-147.75.109.163:42772.service. Sep 13 00:48:48.451106 systemd[1]: sshd@22-172.31.26.227:22-147.75.109.163:42770.service: Deactivated successfully. Sep 13 00:48:48.452508 systemd[1]: session-16.scope: Deactivated successfully. Sep 13 00:48:48.459090 systemd-logind[1719]: Session 16 logged out. Waiting for processes to exit. Sep 13 00:48:48.462099 systemd-logind[1719]: Removed session 16. Sep 13 00:48:48.700827 kernel: kauditd_printk_skb: 28 callbacks suppressed Sep 13 00:48:48.701990 kernel: audit: type=1101 audit(1757724528.692:1520): pid=6136 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:48.692000 audit[6136]: USER_ACCT pid=6136 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:48.706148 kernel: audit: type=1103 audit(1757724528.693:1521): pid=6136 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:48.693000 audit[6136]: CRED_ACQ pid=6136 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:48.697244 sshd[6136]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:48:48.706691 sshd[6136]: Accepted publickey for core from 147.75.109.163 port 42772 ssh2: RSA SHA256:9zKSfA0UBs4YCbMNRE+jf2SchYlhVPu6zl9tBdI5N0M Sep 13 00:48:48.694000 audit[6136]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc0c53030 a2=3 a3=0 items=0 ppid=1 pid=6136 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:48.732900 kernel: audit: type=1006 audit(1757724528.694:1522): pid=6136 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Sep 13 00:48:48.733043 kernel: audit: type=1300 audit(1757724528.694:1522): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc0c53030 a2=3 a3=0 items=0 ppid=1 pid=6136 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:48.734062 kernel: audit: type=1327 audit(1757724528.694:1522): proctitle=737368643A20636F7265205B707269765D Sep 13 00:48:48.694000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:48:48.745445 systemd-logind[1719]: New session 17 of user core. Sep 13 00:48:48.745705 systemd[1]: Started session-17.scope. Sep 13 00:48:48.751000 audit[6136]: USER_START pid=6136 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:48.761623 kernel: audit: type=1105 audit(1757724528.751:1523): pid=6136 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:48.761768 kernel: audit: type=1103 audit(1757724528.753:1524): pid=6139 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:48.753000 audit[6139]: CRED_ACQ pid=6139 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:49.754790 sshd[6136]: pam_unix(sshd:session): session closed for user core Sep 13 00:48:49.788243 kernel: audit: type=1106 audit(1757724529.755:1525): pid=6136 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:49.789367 kernel: audit: type=1104 audit(1757724529.756:1526): pid=6136 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:49.755000 audit[6136]: USER_END pid=6136 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:49.756000 audit[6136]: CRED_DISP pid=6136 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:49.770601 systemd-logind[1719]: Session 17 logged out. Waiting for processes to exit. Sep 13 00:48:49.771800 systemd[1]: sshd@23-172.31.26.227:22-147.75.109.163:42772.service: Deactivated successfully. Sep 13 00:48:49.772865 systemd[1]: session-17.scope: Deactivated successfully. Sep 13 00:48:49.774576 systemd-logind[1719]: Removed session 17. Sep 13 00:48:49.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.26.227:22-147.75.109.163:42772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:49.803166 kernel: audit: type=1131 audit(1757724529.771:1527): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.26.227:22-147.75.109.163:42772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:49.978095 update_engine[1720]: I0913 00:48:49.975075 1720 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Sep 13 00:48:49.990584 update_engine[1720]: I0913 00:48:49.990506 1720 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Sep 13 00:48:49.990868 update_engine[1720]: I0913 00:48:49.990808 1720 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Sep 13 00:48:49.991435 update_engine[1720]: E0913 00:48:49.991268 1720 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Sep 13 00:48:49.991435 update_engine[1720]: I0913 00:48:49.991408 1720 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Sep 13 00:48:53.567000 audit[6149]: NETFILTER_CFG table=filter:134 family=2 entries=22 op=nft_register_rule pid=6149 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:48:53.567000 audit[6149]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffcb184faa0 a2=0 a3=7ffcb184fa8c items=0 ppid=2978 pid=6149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:53.567000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:48:53.580000 audit[6149]: NETFILTER_CFG table=nat:135 family=2 entries=108 op=nft_register_chain pid=6149 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:48:53.580000 audit[6149]: SYSCALL arch=c000003e syscall=46 success=yes exit=50220 a0=3 a1=7ffcb184faa0 a2=0 a3=7ffcb184fa8c items=0 ppid=2978 pid=6149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:53.580000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:48:54.806701 kernel: kauditd_printk_skb: 6 callbacks suppressed Sep 13 00:48:54.807864 kernel: audit: type=1130 audit(1757724534.801:1530): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.26.227:22-147.75.109.163:38074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:54.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.26.227:22-147.75.109.163:38074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:54.801793 systemd[1]: Started sshd@24-172.31.26.227:22-147.75.109.163:38074.service. Sep 13 00:48:55.120000 audit[6151]: USER_ACCT pid=6151 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:55.132165 kernel: audit: type=1101 audit(1757724535.120:1531): pid=6151 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:55.133230 kernel: audit: type=1103 audit(1757724535.131:1532): pid=6151 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:55.131000 audit[6151]: CRED_ACQ pid=6151 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:55.136535 sshd[6151]: Accepted publickey for core from 147.75.109.163 port 38074 ssh2: RSA SHA256:9zKSfA0UBs4YCbMNRE+jf2SchYlhVPu6zl9tBdI5N0M Sep 13 00:48:55.147750 kernel: audit: type=1006 audit(1757724535.131:1533): pid=6151 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Sep 13 00:48:55.137152 sshd[6151]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:48:55.131000 audit[6151]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed2e0c240 a2=3 a3=0 items=0 ppid=1 pid=6151 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:55.178047 kernel: audit: type=1300 audit(1757724535.131:1533): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed2e0c240 a2=3 a3=0 items=0 ppid=1 pid=6151 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:55.178143 kernel: audit: type=1327 audit(1757724535.131:1533): proctitle=737368643A20636F7265205B707269765D Sep 13 00:48:55.131000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:48:55.165556 systemd[1]: Started session-18.scope. Sep 13 00:48:55.169616 systemd-logind[1719]: New session 18 of user core. Sep 13 00:48:55.182000 audit[6151]: USER_START pid=6151 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:55.204845 kernel: audit: type=1105 audit(1757724535.182:1534): pid=6151 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:55.205040 kernel: audit: type=1103 audit(1757724535.185:1535): pid=6153 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:55.185000 audit[6153]: CRED_ACQ pid=6153 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:55.408214 sshd[6059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.126.10.196 user=root Sep 13 00:48:55.417041 kernel: audit: type=1100 audit(1757724535.407:1536): pid=6059 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.126.10.196 addr=101.126.10.196 terminal=ssh res=failed' Sep 13 00:48:55.407000 audit[6059]: USER_AUTH pid=6059 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.126.10.196 addr=101.126.10.196 terminal=ssh res=failed' Sep 13 00:48:56.277874 sshd[6151]: pam_unix(sshd:session): session closed for user core Sep 13 00:48:56.283000 audit[6151]: USER_END pid=6151 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:56.297582 kernel: audit: type=1106 audit(1757724536.283:1537): pid=6151 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:56.283000 audit[6151]: CRED_DISP pid=6151 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:48:56.302504 systemd-logind[1719]: Session 18 logged out. Waiting for processes to exit. Sep 13 00:48:56.303331 systemd[1]: sshd@24-172.31.26.227:22-147.75.109.163:38074.service: Deactivated successfully. Sep 13 00:48:56.303000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.26.227:22-147.75.109.163:38074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:56.304465 systemd[1]: session-18.scope: Deactivated successfully. Sep 13 00:48:56.307177 systemd-logind[1719]: Removed session 18. Sep 13 00:48:57.018361 sshd[6059]: Failed password for root from 101.126.10.196 port 54280 ssh2 Sep 13 00:48:57.770967 sshd[6059]: Connection closed by authenticating user root 101.126.10.196 port 54280 [preauth] Sep 13 00:48:57.797000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.26.227:22-101.126.10.196:54280 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:57.797947 systemd[1]: sshd@20-172.31.26.227:22-101.126.10.196:54280.service: Deactivated successfully. Sep 13 00:48:57.969200 systemd[1]: Started sshd@25-172.31.26.227:22-101.126.10.196:44660.service. Sep 13 00:48:57.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.26.227:22-101.126.10.196:44660 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:48:58.063127 systemd[1]: run-containerd-runc-k8s.io-535e496c9cfa4debca57884c07ac3e953e24c4a98a2b9d734b6c389f56c3c5c8-runc.VmxceO.mount: Deactivated successfully. Sep 13 00:48:59.076980 sshd[6183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.126.10.196 user=root Sep 13 00:48:59.076000 audit[6183]: USER_AUTH pid=6183 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.126.10.196 addr=101.126.10.196 terminal=ssh res=failed' Sep 13 00:48:59.324000 audit[6204]: NETFILTER_CFG table=filter:136 family=2 entries=9 op=nft_register_rule pid=6204 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:48:59.324000 audit[6204]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe98824df0 a2=0 a3=7ffe98824ddc items=0 ppid=2978 pid=6204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:59.324000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:48:59.332000 audit[6204]: NETFILTER_CFG table=nat:137 family=2 entries=55 op=nft_register_chain pid=6204 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:48:59.332000 audit[6204]: SYSCALL arch=c000003e syscall=46 success=yes exit=20100 a0=3 a1=7ffe98824df0 a2=0 a3=7ffe98824ddc items=0 ppid=2978 pid=6204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:48:59.332000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:48:59.986281 update_engine[1720]: I0913 00:48:59.982999 1720 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Sep 13 00:48:59.998523 update_engine[1720]: I0913 00:48:59.998206 1720 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Sep 13 00:49:00.000595 update_engine[1720]: I0913 00:49:00.000504 1720 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Sep 13 00:49:00.001089 update_engine[1720]: E0913 00:49:00.001017 1720 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Sep 13 00:49:00.003588 update_engine[1720]: I0913 00:49:00.003515 1720 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Sep 13 00:49:01.247262 sshd[6183]: Failed password for root from 101.126.10.196 port 44660 ssh2 Sep 13 00:49:01.375401 systemd[1]: Started sshd@26-172.31.26.227:22-147.75.109.163:39298.service. Sep 13 00:49:01.395665 kernel: kauditd_printk_skb: 11 callbacks suppressed Sep 13 00:49:01.397001 kernel: audit: type=1130 audit(1757724541.379:1545): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.26.227:22-147.75.109.163:39298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:01.379000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.26.227:22-147.75.109.163:39298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:01.630000 audit[6206]: USER_ACCT pid=6206 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:49:01.632779 sshd[6206]: Accepted publickey for core from 147.75.109.163 port 39298 ssh2: RSA SHA256:9zKSfA0UBs4YCbMNRE+jf2SchYlhVPu6zl9tBdI5N0M Sep 13 00:49:01.641570 kernel: audit: type=1101 audit(1757724541.630:1546): pid=6206 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:49:01.641000 audit[6206]: CRED_ACQ pid=6206 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:49:01.655892 kernel: audit: type=1103 audit(1757724541.641:1547): pid=6206 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:49:01.646013 sshd[6206]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:49:01.664594 kernel: audit: type=1006 audit(1757724541.641:1548): pid=6206 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Sep 13 00:49:01.641000 audit[6206]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3823edb0 a2=3 a3=0 items=0 ppid=1 pid=6206 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:01.683400 kernel: audit: type=1300 audit(1757724541.641:1548): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3823edb0 a2=3 a3=0 items=0 ppid=1 pid=6206 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:01.641000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:49:01.688607 kernel: audit: type=1327 audit(1757724541.641:1548): proctitle=737368643A20636F7265205B707269765D Sep 13 00:49:01.697910 systemd-logind[1719]: New session 19 of user core. Sep 13 00:49:01.699020 systemd[1]: Started session-19.scope. Sep 13 00:49:01.707000 audit[6206]: USER_START pid=6206 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:49:01.724473 kernel: audit: type=1105 audit(1757724541.707:1549): pid=6206 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:49:01.724000 audit[6208]: CRED_ACQ pid=6208 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:49:01.737608 kernel: audit: type=1103 audit(1757724541.724:1550): pid=6208 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:49:03.619118 sshd[6183]: Connection closed by authenticating user root 101.126.10.196 port 44660 [preauth] Sep 13 00:49:03.622083 systemd[1]: sshd@25-172.31.26.227:22-101.126.10.196:44660.service: Deactivated successfully. Sep 13 00:49:03.622000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.26.227:22-101.126.10.196:44660 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:03.632573 kernel: audit: type=1131 audit(1757724543.622:1551): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.26.227:22-101.126.10.196:44660 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:03.818338 systemd[1]: Started sshd@27-172.31.26.227:22-101.126.10.196:42284.service. Sep 13 00:49:03.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.26.227:22-101.126.10.196:42284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:03.828838 kernel: audit: type=1130 audit(1757724543.819:1552): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.26.227:22-101.126.10.196:42284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:03.952510 sshd[6206]: pam_unix(sshd:session): session closed for user core Sep 13 00:49:03.954000 audit[6206]: USER_END pid=6206 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:49:03.954000 audit[6206]: CRED_DISP pid=6206 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:49:03.957000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.26.227:22-147.75.109.163:39298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:03.957451 systemd[1]: sshd@26-172.31.26.227:22-147.75.109.163:39298.service: Deactivated successfully. Sep 13 00:49:03.959165 systemd[1]: session-19.scope: Deactivated successfully. Sep 13 00:49:03.960372 systemd-logind[1719]: Session 19 logged out. Waiting for processes to exit. Sep 13 00:49:03.962455 systemd-logind[1719]: Removed session 19. Sep 13 00:49:04.835788 sshd[6233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.126.10.196 user=root Sep 13 00:49:04.836000 audit[6233]: USER_AUTH pid=6233 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.126.10.196 addr=101.126.10.196 terminal=ssh res=failed' Sep 13 00:49:06.232000 audit[2476]: AVC avc: denied { watch } for pid=2476 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:49:06.232000 audit[2476]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001c53a60 a2=fc6 a3=0 items=0 ppid=2324 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 key=(null) Sep 13 00:49:06.232000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:49:06.233000 audit[2476]: AVC avc: denied { watch } for pid=2476 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:49:06.233000 audit[2476]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00209cff0 a2=fc6 a3=0 items=0 ppid=2324 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 key=(null) Sep 13 00:49:06.233000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:49:07.353020 sshd[6233]: Failed password for root from 101.126.10.196 port 42284 ssh2 Sep 13 00:49:08.100611 kernel: kauditd_printk_skb: 10 callbacks suppressed Sep 13 00:49:08.101498 kernel: audit: type=1400 audit(1757724548.092:1559): avc: denied { watch } for pid=2447 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c786 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:49:08.092000 audit[2447]: AVC avc: denied { watch } for pid=2447 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c786 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:49:08.092000 audit[2447]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=80 a1=c003e7d980 a2=fc6 a3=0 items=0 ppid=2296 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c786 key=(null) Sep 13 00:49:08.115461 kernel: audit: type=1300 audit(1757724548.092:1559): arch=c000003e syscall=254 success=no exit=-13 a0=80 a1=c003e7d980 a2=fc6 a3=0 items=0 ppid=2296 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c786 key=(null) Sep 13 00:49:08.092000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E323237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Sep 13 00:49:08.127574 kernel: audit: type=1327 audit(1757724548.092:1559): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E323237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Sep 13 00:49:08.100000 audit[2447]: AVC avc: denied { watch } for pid=2447 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c786 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:49:08.100000 audit[2447]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=80 a1=c00e9637a0 a2=fc6 a3=0 items=0 ppid=2296 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c786 key=(null) Sep 13 00:49:08.149092 kernel: audit: type=1400 audit(1757724548.100:1560): avc: denied { watch } for pid=2447 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c786 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:49:08.149252 kernel: audit: type=1300 audit(1757724548.100:1560): arch=c000003e syscall=254 success=no exit=-13 a0=80 a1=c00e9637a0 a2=fc6 a3=0 items=0 ppid=2296 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c786 key=(null) Sep 13 00:49:08.150684 kernel: audit: type=1327 audit(1757724548.100:1560): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E323237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Sep 13 00:49:08.100000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E323237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Sep 13 00:49:08.106000 audit[2447]: AVC avc: denied { watch } for pid=2447 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c786 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:49:08.170021 kernel: audit: type=1400 audit(1757724548.106:1561): avc: denied { watch } for pid=2447 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c786 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:49:08.106000 audit[2447]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=80 a1=c00e963800 a2=fc6 a3=0 items=0 ppid=2296 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c786 key=(null) Sep 13 00:49:08.181229 kernel: audit: type=1300 audit(1757724548.106:1561): arch=c000003e syscall=254 success=no exit=-13 a0=80 a1=c00e963800 a2=fc6 a3=0 items=0 ppid=2296 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c786 key=(null) Sep 13 00:49:08.181478 kernel: audit: type=1327 audit(1757724548.106:1561): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E323237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Sep 13 00:49:08.106000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E323237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Sep 13 00:49:08.113000 audit[2447]: AVC avc: denied { watch } for pid=2447 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c786 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:49:08.201804 kernel: audit: type=1400 audit(1757724548.113:1562): avc: denied { watch } for pid=2447 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c786 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:49:08.113000 audit[2447]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=80 a1=c00e963950 a2=fc6 a3=0 items=0 ppid=2296 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c786 key=(null) Sep 13 00:49:08.113000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E323237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Sep 13 00:49:08.120000 audit[2447]: AVC avc: denied { watch } for pid=2447 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c786 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:49:08.120000 audit[2447]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=80 a1=c00e963b00 a2=fc6 a3=0 items=0 ppid=2296 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c786 key=(null) Sep 13 00:49:08.120000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E323237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Sep 13 00:49:08.121000 audit[2447]: AVC avc: denied { watch } for pid=2447 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c240,c786 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:49:08.121000 audit[2447]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=80 a1=c00bd3c240 a2=fc6 a3=0 items=0 ppid=2296 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c240,c786 key=(null) Sep 13 00:49:08.121000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32362E323237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Sep 13 00:49:08.425000 audit[5235]: AVC avc: denied { watch } for pid=5235 comm="apiserver" path="/calico-apiserver-certs/..2025_09_13_00_47_44.3007411467/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c750 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c224,c750 tclass=file permissive=0 Sep 13 00:49:08.425000 audit[5235]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000edc800 a2=fc6 a3=0 items=0 ppid=4498 pid=5235 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c750 key=(null) Sep 13 00:49:08.425000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 13 00:49:08.991337 systemd[1]: Started sshd@28-172.31.26.227:22-147.75.109.163:39312.service. Sep 13 00:49:08.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-172.31.26.227:22-147.75.109.163:39312 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:09.261000 audit[6242]: USER_ACCT pid=6242 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:49:09.265000 audit[6242]: CRED_ACQ pid=6242 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:49:09.265000 audit[6242]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb2fcf300 a2=3 a3=0 items=0 ppid=1 pid=6242 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:09.265000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:49:09.272304 sshd[6242]: Accepted publickey for core from 147.75.109.163 port 39312 ssh2: RSA SHA256:9zKSfA0UBs4YCbMNRE+jf2SchYlhVPu6zl9tBdI5N0M Sep 13 00:49:09.272504 sshd[6242]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:49:09.299154 systemd[1]: Started session-20.scope. Sep 13 00:49:09.300636 systemd-logind[1719]: New session 20 of user core. Sep 13 00:49:09.307000 audit[6242]: USER_START pid=6242 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:49:09.309000 audit[6244]: CRED_ACQ pid=6244 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:49:09.373112 sshd[6233]: Connection closed by authenticating user root 101.126.10.196 port 42284 [preauth] Sep 13 00:49:09.373993 systemd[1]: sshd@27-172.31.26.227:22-101.126.10.196:42284.service: Deactivated successfully. Sep 13 00:49:09.373000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.26.227:22-101.126.10.196:42284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:09.551000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-172.31.26.227:22-101.126.10.196:60948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:09.552204 systemd[1]: Started sshd@29-172.31.26.227:22-101.126.10.196:60948.service. Sep 13 00:49:09.979709 update_engine[1720]: I0913 00:49:09.976713 1720 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Sep 13 00:49:09.995707 update_engine[1720]: I0913 00:49:09.995365 1720 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Sep 13 00:49:09.998290 update_engine[1720]: I0913 00:49:09.998152 1720 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Sep 13 00:49:09.998525 update_engine[1720]: E0913 00:49:09.998478 1720 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Sep 13 00:49:09.999468 update_engine[1720]: I0913 00:49:09.999399 1720 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Sep 13 00:49:09.999468 update_engine[1720]: I0913 00:49:09.999415 1720 omaha_request_action.cc:621] Omaha request response: Sep 13 00:49:10.001737 update_engine[1720]: E0913 00:49:10.001649 1720 omaha_request_action.cc:640] Omaha request network transfer failed. Sep 13 00:49:10.001737 update_engine[1720]: I0913 00:49:10.001711 1720 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Sep 13 00:49:10.001737 update_engine[1720]: I0913 00:49:10.001716 1720 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Sep 13 00:49:10.001737 update_engine[1720]: I0913 00:49:10.001719 1720 update_attempter.cc:306] Processing Done. Sep 13 00:49:10.003331 update_engine[1720]: E0913 00:49:10.003185 1720 update_attempter.cc:619] Update failed. Sep 13 00:49:10.003331 update_engine[1720]: I0913 00:49:10.003208 1720 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Sep 13 00:49:10.003331 update_engine[1720]: I0913 00:49:10.003213 1720 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Sep 13 00:49:10.003331 update_engine[1720]: I0913 00:49:10.003219 1720 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Sep 13 00:49:10.010910 update_engine[1720]: I0913 00:49:10.010840 1720 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Sep 13 00:49:10.013260 update_engine[1720]: I0913 00:49:10.012753 1720 omaha_request_action.cc:270] Posting an Omaha request to disabled Sep 13 00:49:10.013260 update_engine[1720]: I0913 00:49:10.012778 1720 omaha_request_action.cc:271] Request: Sep 13 00:49:10.013260 update_engine[1720]: Sep 13 00:49:10.013260 update_engine[1720]: Sep 13 00:49:10.013260 update_engine[1720]: Sep 13 00:49:10.013260 update_engine[1720]: Sep 13 00:49:10.013260 update_engine[1720]: Sep 13 00:49:10.013260 update_engine[1720]: Sep 13 00:49:10.013260 update_engine[1720]: I0913 00:49:10.012809 1720 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Sep 13 00:49:10.013260 update_engine[1720]: I0913 00:49:10.012995 1720 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Sep 13 00:49:10.013260 update_engine[1720]: I0913 00:49:10.013207 1720 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Sep 13 00:49:10.018576 update_engine[1720]: E0913 00:49:10.017854 1720 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Sep 13 00:49:10.018576 update_engine[1720]: I0913 00:49:10.017973 1720 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Sep 13 00:49:10.018576 update_engine[1720]: I0913 00:49:10.017982 1720 omaha_request_action.cc:621] Omaha request response: Sep 13 00:49:10.018576 update_engine[1720]: I0913 00:49:10.017989 1720 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Sep 13 00:49:10.018576 update_engine[1720]: I0913 00:49:10.017994 1720 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Sep 13 00:49:10.018576 update_engine[1720]: I0913 00:49:10.017998 1720 update_attempter.cc:306] Processing Done. Sep 13 00:49:10.018576 update_engine[1720]: I0913 00:49:10.018005 1720 update_attempter.cc:310] Error event sent. Sep 13 00:49:10.018576 update_engine[1720]: I0913 00:49:10.018016 1720 update_check_scheduler.cc:74] Next update check in 47m34s Sep 13 00:49:10.059988 locksmithd[1797]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Sep 13 00:49:10.061070 locksmithd[1797]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Sep 13 00:49:10.365894 sshd[6242]: pam_unix(sshd:session): session closed for user core Sep 13 00:49:10.369000 audit[6242]: USER_END pid=6242 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:49:10.369000 audit[6242]: CRED_DISP pid=6242 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:49:10.373657 systemd[1]: sshd@28-172.31.26.227:22-147.75.109.163:39312.service: Deactivated successfully. Sep 13 00:49:10.373000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-172.31.26.227:22-147.75.109.163:39312 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:10.374795 systemd[1]: session-20.scope: Deactivated successfully. Sep 13 00:49:10.375679 systemd-logind[1719]: Session 20 logged out. Waiting for processes to exit. Sep 13 00:49:10.376961 systemd-logind[1719]: Removed session 20. Sep 13 00:49:10.698794 sshd[6253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.126.10.196 user=root Sep 13 00:49:10.698000 audit[6253]: USER_AUTH pid=6253 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.126.10.196 addr=101.126.10.196 terminal=ssh res=failed' Sep 13 00:49:13.046634 sshd[6253]: Failed password for root from 101.126.10.196 port 60948 ssh2 Sep 13 00:49:13.302582 kernel: kauditd_printk_skb: 25 callbacks suppressed Sep 13 00:49:13.328799 kernel: audit: type=1400 audit(1757724553.291:1578): avc: denied { watch } for pid=2476 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:49:13.329632 kernel: audit: type=1300 audit(1757724553.291:1578): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001f6df00 a2=fc6 a3=0 items=0 ppid=2324 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 key=(null) Sep 13 00:49:13.330361 kernel: audit: type=1327 audit(1757724553.291:1578): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:49:13.291000 audit[2476]: AVC avc: denied { watch } for pid=2476 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:49:13.386481 kernel: audit: type=1400 audit(1757724553.316:1579): avc: denied { watch } for pid=2476 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:49:13.386620 kernel: audit: type=1300 audit(1757724553.316:1579): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001f6df20 a2=fc6 a3=0 items=0 ppid=2324 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 key=(null) Sep 13 00:49:13.386662 kernel: audit: type=1327 audit(1757724553.316:1579): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:49:13.386700 kernel: audit: type=1400 audit(1757724553.329:1580): avc: denied { watch } for pid=2476 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:49:13.386760 kernel: audit: type=1300 audit(1757724553.329:1580): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002968ae0 a2=fc6 a3=0 items=0 ppid=2324 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 key=(null) Sep 13 00:49:13.291000 audit[2476]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001f6df00 a2=fc6 a3=0 items=0 ppid=2324 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 key=(null) Sep 13 00:49:13.404147 kernel: audit: type=1327 audit(1757724553.329:1580): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:49:13.291000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:49:13.316000 audit[2476]: AVC avc: denied { watch } for pid=2476 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:49:13.316000 audit[2476]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001f6df20 a2=fc6 a3=0 items=0 ppid=2324 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 key=(null) Sep 13 00:49:13.316000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:49:13.329000 audit[2476]: AVC avc: denied { watch } for pid=2476 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:49:13.413599 kernel: audit: type=1400 audit(1757724553.404:1581): avc: denied { watch } for pid=2476 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:49:13.329000 audit[2476]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002968ae0 a2=fc6 a3=0 items=0 ppid=2324 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 key=(null) Sep 13 00:49:13.329000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:49:13.404000 audit[2476]: AVC avc: denied { watch } for pid=2476 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:49:13.404000 audit[2476]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002968b40 a2=fc6 a3=0 items=0 ppid=2324 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 key=(null) Sep 13 00:49:13.404000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:49:15.401818 systemd[1]: Started sshd@30-172.31.26.227:22-147.75.109.163:34926.service. Sep 13 00:49:15.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-172.31.26.227:22-147.75.109.163:34926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:15.676000 audit[6277]: USER_ACCT pid=6277 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:49:15.678000 audit[6277]: CRED_ACQ pid=6277 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:49:15.678000 audit[6277]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcef384240 a2=3 a3=0 items=0 ppid=1 pid=6277 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:15.678000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:49:15.694205 sshd[6277]: Accepted publickey for core from 147.75.109.163 port 34926 ssh2: RSA SHA256:9zKSfA0UBs4YCbMNRE+jf2SchYlhVPu6zl9tBdI5N0M Sep 13 00:49:15.685442 sshd[6277]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:49:15.724829 systemd[1]: Started session-21.scope. Sep 13 00:49:15.725936 systemd-logind[1719]: New session 21 of user core. Sep 13 00:49:15.734000 audit[6277]: USER_START pid=6277 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:49:15.736000 audit[6279]: CRED_ACQ pid=6279 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:49:18.011995 sshd[6277]: pam_unix(sshd:session): session closed for user core Sep 13 00:49:18.020000 audit[6277]: USER_END pid=6277 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:49:18.021000 audit[6277]: CRED_DISP pid=6277 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:49:18.030000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-172.31.26.227:22-147.75.109.163:34926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:18.031011 systemd[1]: sshd@30-172.31.26.227:22-147.75.109.163:34926.service: Deactivated successfully. Sep 13 00:49:18.034090 systemd[1]: session-21.scope: Deactivated successfully. Sep 13 00:49:18.035445 systemd-logind[1719]: Session 21 logged out. Waiting for processes to exit. Sep 13 00:49:18.048137 systemd-logind[1719]: Removed session 21. Sep 13 00:49:22.313566 kernel: kauditd_printk_skb: 13 callbacks suppressed Sep 13 00:49:22.368308 kernel: audit: type=1325 audit(1757724562.304:1591): table=filter:138 family=2 entries=8 op=nft_register_rule pid=6296 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:49:22.376280 kernel: audit: type=1300 audit(1757724562.304:1591): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffdec69d190 a2=0 a3=7ffdec69d17c items=0 ppid=2978 pid=6296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:22.377469 kernel: audit: type=1327 audit(1757724562.304:1591): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:49:22.378229 kernel: audit: type=1325 audit(1757724562.340:1592): table=nat:139 family=2 entries=62 op=nft_register_chain pid=6296 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:49:22.378898 kernel: audit: type=1300 audit(1757724562.340:1592): arch=c000003e syscall=46 success=yes exit=21988 a0=3 a1=7ffdec69d190 a2=0 a3=7ffdec69d17c items=0 ppid=2978 pid=6296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:22.379784 kernel: audit: type=1327 audit(1757724562.340:1592): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:49:22.304000 audit[6296]: NETFILTER_CFG table=filter:138 family=2 entries=8 op=nft_register_rule pid=6296 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:49:22.304000 audit[6296]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffdec69d190 a2=0 a3=7ffdec69d17c items=0 ppid=2978 pid=6296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:22.304000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:49:22.340000 audit[6296]: NETFILTER_CFG table=nat:139 family=2 entries=62 op=nft_register_chain pid=6296 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:49:22.340000 audit[6296]: SYSCALL arch=c000003e syscall=46 success=yes exit=21988 a0=3 a1=7ffdec69d190 a2=0 a3=7ffdec69d17c items=0 ppid=2978 pid=6296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:22.340000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:49:23.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-172.31.26.227:22-147.75.109.163:41072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:23.073980 kernel: audit: type=1130 audit(1757724563.064:1593): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-172.31.26.227:22-147.75.109.163:41072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:23.065225 systemd[1]: Started sshd@31-172.31.26.227:22-147.75.109.163:41072.service. Sep 13 00:49:23.380000 audit[6298]: USER_ACCT pid=6298 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:49:23.397948 kernel: audit: type=1101 audit(1757724563.380:1594): pid=6298 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:49:23.398030 kernel: audit: type=1103 audit(1757724563.381:1595): pid=6298 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:49:23.381000 audit[6298]: CRED_ACQ pid=6298 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:49:23.399130 sshd[6298]: Accepted publickey for core from 147.75.109.163 port 41072 ssh2: RSA SHA256:9zKSfA0UBs4YCbMNRE+jf2SchYlhVPu6zl9tBdI5N0M Sep 13 00:49:23.391573 sshd[6298]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:49:23.416564 kernel: audit: type=1006 audit(1757724563.381:1596): pid=6298 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Sep 13 00:49:23.381000 audit[6298]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea0af2590 a2=3 a3=0 items=0 ppid=1 pid=6298 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:23.381000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:49:23.452407 systemd-logind[1719]: New session 22 of user core. Sep 13 00:49:23.453473 systemd[1]: Started session-22.scope. Sep 13 00:49:23.465000 audit[6298]: USER_START pid=6298 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:49:23.467000 audit[6300]: CRED_ACQ pid=6300 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:49:25.099043 sshd[6298]: pam_unix(sshd:session): session closed for user core Sep 13 00:49:25.129000 audit[6298]: USER_END pid=6298 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:49:25.132000 audit[6298]: CRED_DISP pid=6298 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:49:25.152000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-172.31.26.227:22-147.75.109.163:41072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:49:25.151723 systemd[1]: sshd@31-172.31.26.227:22-147.75.109.163:41072.service: Deactivated successfully. Sep 13 00:49:25.161121 systemd[1]: session-22.scope: Deactivated successfully. Sep 13 00:49:25.163688 systemd-logind[1719]: Session 22 logged out. Waiting for processes to exit. Sep 13 00:49:25.176387 systemd-logind[1719]: Removed session 22. Sep 13 00:49:27.678000 audit[5780]: AVC avc: denied { watch } for pid=5780 comm="apiserver" path="/calico-apiserver-certs/..2025_09_13_00_47_44.2244096695/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c543 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c543 tclass=file permissive=0 Sep 13 00:49:27.687612 kernel: kauditd_printk_skb: 7 callbacks suppressed Sep 13 00:49:27.698808 kernel: audit: type=1400 audit(1757724567.678:1602): avc: denied { watch } for pid=5780 comm="apiserver" path="/calico-apiserver-certs/..2025_09_13_00_47_44.2244096695/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c484,c543 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c484,c543 tclass=file permissive=0 Sep 13 00:49:27.699446 kernel: audit: type=1300 audit(1757724567.678:1602): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000d62e20 a2=fc6 a3=0 items=0 ppid=4926 pid=5780 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c543 key=(null) Sep 13 00:49:27.678000 audit[5780]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000d62e20 a2=fc6 a3=0 items=0 ppid=4926 pid=5780 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c484,c543 key=(null) Sep 13 00:49:27.678000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 13 00:49:27.723584 kernel: audit: type=1327 audit(1757724567.678:1602): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 13 00:49:33.435193 systemd[1]: run-containerd-runc-k8s.io-6cb8aba7eee7989057b44821b41666c8cd75bc55cca167837f802d52af7b74ec-runc.XTvvcA.mount: Deactivated successfully. Sep 13 00:49:38.740003 systemd[1]: cri-containerd-04aadc8058fdcedfab4a0cb0d9e35c83d188fd3bbb0726ed796a8f8964cf37d0.scope: Deactivated successfully. Sep 13 00:49:38.743000 audit: BPF prog-id=80 op=UNLOAD Sep 13 00:49:38.754174 kernel: audit: type=1334 audit(1757724578.743:1603): prog-id=80 op=UNLOAD Sep 13 00:49:38.755483 kernel: audit: type=1334 audit(1757724578.743:1604): prog-id=104 op=UNLOAD Sep 13 00:49:38.743000 audit: BPF prog-id=104 op=UNLOAD Sep 13 00:49:38.741728 systemd[1]: cri-containerd-04aadc8058fdcedfab4a0cb0d9e35c83d188fd3bbb0726ed796a8f8964cf37d0.scope: Consumed 3.965s CPU time. Sep 13 00:49:38.783000 audit: BPF prog-id=121 op=UNLOAD Sep 13 00:49:38.787700 kernel: audit: type=1334 audit(1757724578.783:1605): prog-id=121 op=UNLOAD Sep 13 00:49:38.791715 kernel: audit: type=1334 audit(1757724578.789:1606): prog-id=124 op=UNLOAD Sep 13 00:49:38.789000 audit: BPF prog-id=124 op=UNLOAD Sep 13 00:49:38.784095 systemd[1]: cri-containerd-82e2f89900f8b5342495b987b6419051ce154d36cbbe0bed81347877a1071c50.scope: Deactivated successfully. Sep 13 00:49:38.784439 systemd[1]: cri-containerd-82e2f89900f8b5342495b987b6419051ce154d36cbbe0bed81347877a1071c50.scope: Consumed 18.968s CPU time. Sep 13 00:49:38.817108 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-04aadc8058fdcedfab4a0cb0d9e35c83d188fd3bbb0726ed796a8f8964cf37d0-rootfs.mount: Deactivated successfully. Sep 13 00:49:38.820924 env[1726]: time="2025-09-13T00:49:38.819518712Z" level=info msg="shim disconnected" id=04aadc8058fdcedfab4a0cb0d9e35c83d188fd3bbb0726ed796a8f8964cf37d0 Sep 13 00:49:38.820924 env[1726]: time="2025-09-13T00:49:38.819833887Z" level=warning msg="cleaning up after shim disconnected" id=04aadc8058fdcedfab4a0cb0d9e35c83d188fd3bbb0726ed796a8f8964cf37d0 namespace=k8s.io Sep 13 00:49:38.820924 env[1726]: time="2025-09-13T00:49:38.819858412Z" level=info msg="cleaning up dead shim" Sep 13 00:49:38.836176 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-82e2f89900f8b5342495b987b6419051ce154d36cbbe0bed81347877a1071c50-rootfs.mount: Deactivated successfully. Sep 13 00:49:38.839749 env[1726]: time="2025-09-13T00:49:38.838627644Z" level=info msg="shim disconnected" id=82e2f89900f8b5342495b987b6419051ce154d36cbbe0bed81347877a1071c50 Sep 13 00:49:38.839749 env[1726]: time="2025-09-13T00:49:38.838681073Z" level=warning msg="cleaning up after shim disconnected" id=82e2f89900f8b5342495b987b6419051ce154d36cbbe0bed81347877a1071c50 namespace=k8s.io Sep 13 00:49:38.839749 env[1726]: time="2025-09-13T00:49:38.838703197Z" level=info msg="cleaning up dead shim" Sep 13 00:49:38.839749 env[1726]: time="2025-09-13T00:49:38.839154758Z" level=warning msg="cleanup warnings time=\"2025-09-13T00:49:38Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6398 runtime=io.containerd.runc.v2\n" Sep 13 00:49:38.848751 env[1726]: time="2025-09-13T00:49:38.848700569Z" level=warning msg="cleanup warnings time=\"2025-09-13T00:49:38Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6412 runtime=io.containerd.runc.v2\n" Sep 13 00:49:39.330861 kubelet[2611]: I0913 00:49:39.329143 2611 scope.go:117] "RemoveContainer" containerID="f1b0cd01527db53878e9a2ed98525219c01e3312a1bb8a726473eedb81f8063d" Sep 13 00:49:39.332908 kubelet[2611]: I0913 00:49:39.332420 2611 scope.go:117] "RemoveContainer" containerID="04aadc8058fdcedfab4a0cb0d9e35c83d188fd3bbb0726ed796a8f8964cf37d0" Sep 13 00:49:39.338253 kubelet[2611]: I0913 00:49:39.338214 2611 scope.go:117] "RemoveContainer" containerID="82e2f89900f8b5342495b987b6419051ce154d36cbbe0bed81347877a1071c50" Sep 13 00:49:39.349882 kubelet[2611]: E0913 00:49:39.349807 2611 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"tigera-operator\" with CrashLoopBackOff: \"back-off 10s restarting failed container=tigera-operator pod=tigera-operator-755d956888-t5dr5_tigera-operator(0b34ed5a-1d80-4223-88c6-59ef916f37f7)\"" pod="tigera-operator/tigera-operator-755d956888-t5dr5" podUID="0b34ed5a-1d80-4223-88c6-59ef916f37f7" Sep 13 00:49:39.369980 env[1726]: time="2025-09-13T00:49:39.369634223Z" level=info msg="CreateContainer within sandbox \"1889ef600f0b43e680b4f4f2ca00aee4e98339cdad2c527e1b30fef60d0f9d0d\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Sep 13 00:49:39.374708 env[1726]: time="2025-09-13T00:49:39.374656858Z" level=info msg="RemoveContainer for \"f1b0cd01527db53878e9a2ed98525219c01e3312a1bb8a726473eedb81f8063d\"" Sep 13 00:49:39.391280 env[1726]: time="2025-09-13T00:49:39.391242375Z" level=info msg="RemoveContainer for \"f1b0cd01527db53878e9a2ed98525219c01e3312a1bb8a726473eedb81f8063d\" returns successfully" Sep 13 00:49:39.420086 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3453443251.mount: Deactivated successfully. Sep 13 00:49:39.446444 env[1726]: time="2025-09-13T00:49:39.446394481Z" level=info msg="CreateContainer within sandbox \"1889ef600f0b43e680b4f4f2ca00aee4e98339cdad2c527e1b30fef60d0f9d0d\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"b1cd10ca78d1b22f2e18b235895882ffffddb913f99a8197ac30b8f0cab9ba81\"" Sep 13 00:49:39.446961 env[1726]: time="2025-09-13T00:49:39.446932785Z" level=info msg="StartContainer for \"b1cd10ca78d1b22f2e18b235895882ffffddb913f99a8197ac30b8f0cab9ba81\"" Sep 13 00:49:39.478531 systemd[1]: Started cri-containerd-b1cd10ca78d1b22f2e18b235895882ffffddb913f99a8197ac30b8f0cab9ba81.scope. Sep 13 00:49:39.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:39.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:39.511762 kernel: audit: type=1400 audit(1757724579.498:1607): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:39.511890 kernel: audit: type=1400 audit(1757724579.498:1608): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:39.519166 kernel: audit: type=1400 audit(1757724579.498:1609): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:39.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:39.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:39.525165 kernel: audit: type=1400 audit(1757724579.498:1610): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:39.532113 kernel: audit: type=1400 audit(1757724579.498:1611): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:39.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:39.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:39.538758 kernel: audit: type=1400 audit(1757724579.498:1612): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:39.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:39.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:39.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:39.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:39.499000 audit: BPF prog-id=238 op=LOAD Sep 13 00:49:39.510000 audit[6432]: AVC avc: denied { bpf } for pid=6432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:39.510000 audit[6432]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2324 pid=6432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:39.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231636431306361373864316232326632653138623233353839353838 Sep 13 00:49:39.510000 audit[6432]: AVC avc: denied { perfmon } for pid=6432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:39.510000 audit[6432]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2324 pid=6432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:39.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231636431306361373864316232326632653138623233353839353838 Sep 13 00:49:39.510000 audit[6432]: AVC avc: denied { bpf } for pid=6432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:39.510000 audit[6432]: AVC avc: denied { bpf } for pid=6432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:39.510000 audit[6432]: AVC avc: denied { bpf } for pid=6432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:39.510000 audit[6432]: AVC avc: denied { perfmon } for pid=6432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:39.510000 audit[6432]: AVC avc: denied { perfmon } for pid=6432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:39.510000 audit[6432]: AVC avc: denied { perfmon } for pid=6432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:39.510000 audit[6432]: AVC avc: denied { perfmon } for pid=6432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:39.510000 audit[6432]: AVC avc: denied { perfmon } for pid=6432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:39.510000 audit[6432]: AVC avc: denied { bpf } for pid=6432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:39.510000 audit[6432]: AVC avc: denied { bpf } for pid=6432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:39.510000 audit: BPF prog-id=239 op=LOAD Sep 13 00:49:39.510000 audit[6432]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002f6960 items=0 ppid=2324 pid=6432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:39.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231636431306361373864316232326632653138623233353839353838 Sep 13 00:49:39.511000 audit[6432]: AVC avc: denied { bpf } for pid=6432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:39.511000 audit[6432]: AVC avc: denied { bpf } for pid=6432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:39.511000 audit[6432]: AVC avc: denied { perfmon } for pid=6432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:39.511000 audit[6432]: AVC avc: denied { perfmon } for pid=6432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:39.511000 audit[6432]: AVC avc: denied { perfmon } for pid=6432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:39.511000 audit[6432]: AVC avc: denied { perfmon } for pid=6432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:39.511000 audit[6432]: AVC avc: denied { perfmon } for pid=6432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:39.511000 audit[6432]: AVC avc: denied { bpf } for pid=6432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:39.511000 audit[6432]: AVC avc: denied { bpf } for pid=6432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:39.511000 audit: BPF prog-id=240 op=LOAD Sep 13 00:49:39.511000 audit[6432]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002f69a8 items=0 ppid=2324 pid=6432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:39.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231636431306361373864316232326632653138623233353839353838 Sep 13 00:49:39.511000 audit: BPF prog-id=240 op=UNLOAD Sep 13 00:49:39.512000 audit: BPF prog-id=239 op=UNLOAD Sep 13 00:49:39.512000 audit[6432]: AVC avc: denied { bpf } for pid=6432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:39.512000 audit[6432]: AVC avc: denied { bpf } for pid=6432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:39.512000 audit[6432]: AVC avc: denied { bpf } for pid=6432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:39.512000 audit[6432]: AVC avc: denied { perfmon } for pid=6432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:39.512000 audit[6432]: AVC avc: denied { perfmon } for pid=6432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:39.512000 audit[6432]: AVC avc: denied { perfmon } for pid=6432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:39.512000 audit[6432]: AVC avc: denied { perfmon } for pid=6432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:39.512000 audit[6432]: AVC avc: denied { perfmon } for pid=6432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:39.512000 audit[6432]: AVC avc: denied { bpf } for pid=6432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:39.512000 audit[6432]: AVC avc: denied { bpf } for pid=6432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:39.512000 audit: BPF prog-id=241 op=LOAD Sep 13 00:49:39.512000 audit[6432]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002f6db8 items=0 ppid=2324 pid=6432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:39.512000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231636431306361373864316232326632653138623233353839353838 Sep 13 00:49:39.580724 env[1726]: time="2025-09-13T00:49:39.580607780Z" level=info msg="StartContainer for \"b1cd10ca78d1b22f2e18b235895882ffffddb913f99a8197ac30b8f0cab9ba81\" returns successfully" Sep 13 00:49:39.817887 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3833459697.mount: Deactivated successfully. Sep 13 00:49:40.923713 systemd[1]: run-containerd-runc-k8s.io-1eed56009ba23edec9eccbcbd858431b2712595fa1dc76b77a553b20c735b507-runc.9n1Q1X.mount: Deactivated successfully. Sep 13 00:49:40.998000 audit[6442]: AVC avc: denied { watch } for pid=6442 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:49:40.998000 audit[6442]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000b390e0 a2=fc6 a3=0 items=0 ppid=2324 pid=6442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 key=(null) Sep 13 00:49:40.998000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:49:40.998000 audit[6442]: AVC avc: denied { watch } for pid=6442 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:49:40.998000 audit[6442]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0003f9ba0 a2=fc6 a3=0 items=0 ppid=2324 pid=6442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c150 key=(null) Sep 13 00:49:40.998000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:49:43.691690 systemd[1]: cri-containerd-9147f829ed91e847124cb4bc5e7385a948982f186110f2879a80a4a59ba59f52.scope: Deactivated successfully. Sep 13 00:49:43.692018 systemd[1]: cri-containerd-9147f829ed91e847124cb4bc5e7385a948982f186110f2879a80a4a59ba59f52.scope: Consumed 2.230s CPU time. Sep 13 00:49:43.695000 audit: BPF prog-id=84 op=UNLOAD Sep 13 00:49:43.695000 audit: BPF prog-id=86 op=UNLOAD Sep 13 00:49:43.719345 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-9147f829ed91e847124cb4bc5e7385a948982f186110f2879a80a4a59ba59f52-rootfs.mount: Deactivated successfully. Sep 13 00:49:43.721177 env[1726]: time="2025-09-13T00:49:43.721122474Z" level=info msg="shim disconnected" id=9147f829ed91e847124cb4bc5e7385a948982f186110f2879a80a4a59ba59f52 Sep 13 00:49:43.721666 env[1726]: time="2025-09-13T00:49:43.721183589Z" level=warning msg="cleaning up after shim disconnected" id=9147f829ed91e847124cb4bc5e7385a948982f186110f2879a80a4a59ba59f52 namespace=k8s.io Sep 13 00:49:43.721666 env[1726]: time="2025-09-13T00:49:43.721197096Z" level=info msg="cleaning up dead shim" Sep 13 00:49:43.730167 env[1726]: time="2025-09-13T00:49:43.730122376Z" level=warning msg="cleanup warnings time=\"2025-09-13T00:49:43Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6487 runtime=io.containerd.runc.v2\n" Sep 13 00:49:44.012391 systemd[1]: run-containerd-runc-k8s.io-1eed56009ba23edec9eccbcbd858431b2712595fa1dc76b77a553b20c735b507-runc.cP6AuO.mount: Deactivated successfully. Sep 13 00:49:44.291287 kubelet[2611]: I0913 00:49:44.291200 2611 scope.go:117] "RemoveContainer" containerID="9147f829ed91e847124cb4bc5e7385a948982f186110f2879a80a4a59ba59f52" Sep 13 00:49:44.293806 env[1726]: time="2025-09-13T00:49:44.293766327Z" level=info msg="CreateContainer within sandbox \"64d8653bdf111632af1d6d45d8259ec9838069411d5cc0d9a840d3dc1936345c\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Sep 13 00:49:44.316024 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2512023252.mount: Deactivated successfully. Sep 13 00:49:44.325125 env[1726]: time="2025-09-13T00:49:44.325065671Z" level=info msg="CreateContainer within sandbox \"64d8653bdf111632af1d6d45d8259ec9838069411d5cc0d9a840d3dc1936345c\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"c853079e6ddbcef8e36602c5b3dec45f1b61a508ab5ffae72c3483cdd1a0be16\"" Sep 13 00:49:44.325741 env[1726]: time="2025-09-13T00:49:44.325702669Z" level=info msg="StartContainer for \"c853079e6ddbcef8e36602c5b3dec45f1b61a508ab5ffae72c3483cdd1a0be16\"" Sep 13 00:49:44.352908 systemd[1]: Started cri-containerd-c853079e6ddbcef8e36602c5b3dec45f1b61a508ab5ffae72c3483cdd1a0be16.scope. Sep 13 00:49:44.379436 kernel: kauditd_printk_skb: 59 callbacks suppressed Sep 13 00:49:44.380034 kernel: audit: type=1400 audit(1757724584.369:1629): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.395061 kernel: audit: type=1400 audit(1757724584.369:1630): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.395195 kernel: audit: type=1400 audit(1757724584.369:1631): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.402343 kernel: audit: type=1400 audit(1757724584.369:1632): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.416506 kernel: audit: type=1400 audit(1757724584.369:1633): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.416666 kernel: audit: type=1400 audit(1757724584.369:1634): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.433352 kernel: audit: type=1400 audit(1757724584.369:1635): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.433508 kernel: audit: type=1400 audit(1757724584.369:1636): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.451272 kernel: audit: type=1400 audit(1757724584.369:1637): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.451425 kernel: audit: type=1400 audit(1757724584.369:1638): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.369000 audit: BPF prog-id=242 op=LOAD Sep 13 00:49:44.369000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.369000 audit[6525]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2351 pid=6525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:44.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338353330373965366464626365663865333636303263356233646563 Sep 13 00:49:44.369000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.369000 audit[6525]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2351 pid=6525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:44.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338353330373965366464626365663865333636303263356233646563 Sep 13 00:49:44.369000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.369000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.369000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.369000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.369000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.369000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.369000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.369000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.369000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.369000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.369000 audit: BPF prog-id=243 op=LOAD Sep 13 00:49:44.369000 audit[6525]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000265d90 items=0 ppid=2351 pid=6525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:44.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338353330373965366464626365663865333636303263356233646563 Sep 13 00:49:44.372000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.372000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.372000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.372000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.372000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.372000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.372000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.372000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.372000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.372000 audit: BPF prog-id=244 op=LOAD Sep 13 00:49:44.372000 audit[6525]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000265dd8 items=0 ppid=2351 pid=6525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:44.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338353330373965366464626365663865333636303263356233646563 Sep 13 00:49:44.378000 audit: BPF prog-id=244 op=UNLOAD Sep 13 00:49:44.378000 audit: BPF prog-id=243 op=UNLOAD Sep 13 00:49:44.378000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.378000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.378000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.378000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.378000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.378000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.378000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.378000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.378000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.378000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:44.378000 audit: BPF prog-id=245 op=LOAD Sep 13 00:49:44.378000 audit[6525]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003421e8 items=0 ppid=2351 pid=6525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:44.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338353330373965366464626365663865333636303263356233646563 Sep 13 00:49:44.459833 env[1726]: time="2025-09-13T00:49:44.459787503Z" level=info msg="StartContainer for \"c853079e6ddbcef8e36602c5b3dec45f1b61a508ab5ffae72c3483cdd1a0be16\" returns successfully" Sep 13 00:49:46.448712 kubelet[2611]: E0913 00:49:46.448622 2611 controller.go:195] "Failed to update lease" err="Put \"https://172.31.26.227:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-26-227?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Sep 13 00:49:54.493209 kubelet[2611]: I0913 00:49:54.493168 2611 scope.go:117] "RemoveContainer" containerID="82e2f89900f8b5342495b987b6419051ce154d36cbbe0bed81347877a1071c50" Sep 13 00:49:54.502634 env[1726]: time="2025-09-13T00:49:54.502257815Z" level=info msg="CreateContainer within sandbox \"7d0c343c589d275451dfbf3b4a882cdb6db9272695571d7d8bca34dab99bedcc\" for container &ContainerMetadata{Name:tigera-operator,Attempt:2,}" Sep 13 00:49:54.526758 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2488917479.mount: Deactivated successfully. Sep 13 00:49:54.538900 env[1726]: time="2025-09-13T00:49:54.538842099Z" level=info msg="CreateContainer within sandbox \"7d0c343c589d275451dfbf3b4a882cdb6db9272695571d7d8bca34dab99bedcc\" for &ContainerMetadata{Name:tigera-operator,Attempt:2,} returns container id \"0d12b0324aff684d8ae5684b6d1b6c426d5c801be9326aebe3389e9cf2ed3280\"" Sep 13 00:49:54.539485 env[1726]: time="2025-09-13T00:49:54.539452428Z" level=info msg="StartContainer for \"0d12b0324aff684d8ae5684b6d1b6c426d5c801be9326aebe3389e9cf2ed3280\"" Sep 13 00:49:54.581384 systemd[1]: Started cri-containerd-0d12b0324aff684d8ae5684b6d1b6c426d5c801be9326aebe3389e9cf2ed3280.scope. Sep 13 00:49:54.599779 kernel: kauditd_printk_skb: 47 callbacks suppressed Sep 13 00:49:54.599926 kernel: audit: type=1400 audit(1757724594.596:1647): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.613186 kernel: audit: type=1400 audit(1757724594.596:1648): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.613792 kernel: audit: type=1400 audit(1757724594.596:1649): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.621112 kernel: audit: type=1400 audit(1757724594.596:1650): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.634927 kernel: audit: type=1400 audit(1757724594.596:1651): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.635010 kernel: audit: type=1400 audit(1757724594.596:1652): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.641946 kernel: audit: type=1400 audit(1757724594.596:1653): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.653306 kernel: audit: type=1400 audit(1757724594.596:1654): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.653449 kernel: audit: type=1400 audit(1757724594.596:1655): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.664092 kernel: audit: type=1400 audit(1757724594.598:1656): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.598000 audit: BPF prog-id=246 op=LOAD Sep 13 00:49:54.600000 audit[6565]: AVC avc: denied { bpf } for pid=6565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.600000 audit[6565]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3002 pid=6565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:54.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064313262303332346166663638346438616535363834623664316236 Sep 13 00:49:54.600000 audit[6565]: AVC avc: denied { perfmon } for pid=6565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.600000 audit[6565]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3002 pid=6565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:54.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064313262303332346166663638346438616535363834623664316236 Sep 13 00:49:54.600000 audit[6565]: AVC avc: denied { bpf } for pid=6565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.600000 audit[6565]: AVC avc: denied { bpf } for pid=6565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.600000 audit[6565]: AVC avc: denied { bpf } for pid=6565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.600000 audit[6565]: AVC avc: denied { perfmon } for pid=6565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.600000 audit[6565]: AVC avc: denied { perfmon } for pid=6565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.600000 audit[6565]: AVC avc: denied { perfmon } for pid=6565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.600000 audit[6565]: AVC avc: denied { perfmon } for pid=6565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.600000 audit[6565]: AVC avc: denied { perfmon } for pid=6565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.600000 audit[6565]: AVC avc: denied { bpf } for pid=6565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.600000 audit[6565]: AVC avc: denied { bpf } for pid=6565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.600000 audit: BPF prog-id=247 op=LOAD Sep 13 00:49:54.600000 audit[6565]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000338020 items=0 ppid=3002 pid=6565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:54.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064313262303332346166663638346438616535363834623664316236 Sep 13 00:49:54.605000 audit[6565]: AVC avc: denied { bpf } for pid=6565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.605000 audit[6565]: AVC avc: denied { bpf } for pid=6565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.605000 audit[6565]: AVC avc: denied { perfmon } for pid=6565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.605000 audit[6565]: AVC avc: denied { perfmon } for pid=6565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.605000 audit[6565]: AVC avc: denied { perfmon } for pid=6565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.605000 audit[6565]: AVC avc: denied { perfmon } for pid=6565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.605000 audit[6565]: AVC avc: denied { perfmon } for pid=6565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.605000 audit[6565]: AVC avc: denied { bpf } for pid=6565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.605000 audit[6565]: AVC avc: denied { bpf } for pid=6565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.605000 audit: BPF prog-id=248 op=LOAD Sep 13 00:49:54.605000 audit[6565]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000338068 items=0 ppid=3002 pid=6565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:54.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064313262303332346166663638346438616535363834623664316236 Sep 13 00:49:54.612000 audit: BPF prog-id=248 op=UNLOAD Sep 13 00:49:54.612000 audit: BPF prog-id=247 op=UNLOAD Sep 13 00:49:54.613000 audit[6565]: AVC avc: denied { bpf } for pid=6565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.613000 audit[6565]: AVC avc: denied { bpf } for pid=6565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.613000 audit[6565]: AVC avc: denied { bpf } for pid=6565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.613000 audit[6565]: AVC avc: denied { perfmon } for pid=6565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.613000 audit[6565]: AVC avc: denied { perfmon } for pid=6565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.613000 audit[6565]: AVC avc: denied { perfmon } for pid=6565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.613000 audit[6565]: AVC avc: denied { perfmon } for pid=6565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.613000 audit[6565]: AVC avc: denied { perfmon } for pid=6565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.613000 audit[6565]: AVC avc: denied { bpf } for pid=6565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.613000 audit[6565]: AVC avc: denied { bpf } for pid=6565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:49:54.613000 audit: BPF prog-id=249 op=LOAD Sep 13 00:49:54.613000 audit[6565]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000338478 items=0 ppid=3002 pid=6565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:49:54.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064313262303332346166663638346438616535363834623664316236 Sep 13 00:49:54.686612 env[1726]: time="2025-09-13T00:49:54.686352292Z" level=info msg="StartContainer for \"0d12b0324aff684d8ae5684b6d1b6c426d5c801be9326aebe3389e9cf2ed3280\" returns successfully" Sep 13 00:49:55.520949 systemd[1]: run-containerd-runc-k8s.io-0d12b0324aff684d8ae5684b6d1b6c426d5c801be9326aebe3389e9cf2ed3280-runc.l5RMv1.mount: Deactivated successfully. Sep 13 00:49:56.448958 kubelet[2611]: E0913 00:49:56.448889 2611 controller.go:195] "Failed to update lease" err="Put \"https://172.31.26.227:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-26-227?timeout=10s\": context deadline exceeded" Sep 13 00:49:56.759224 systemd[1]: run-containerd-runc-k8s.io-535e496c9cfa4debca57884c07ac3e953e24c4a98a2b9d734b6c389f56c3c5c8-runc.vyb8Wu.mount: Deactivated successfully. Sep 13 00:49:58.046561 systemd[1]: run-containerd-runc-k8s.io-535e496c9cfa4debca57884c07ac3e953e24c4a98a2b9d734b6c389f56c3c5c8-runc.IRJcTF.mount: Deactivated successfully.